id
stringlengths
50
55
text
stringlengths
54
694k
global_05_local_5_shard_00002591_processed.jsonl/32206
Discussion on: From Rails to Elixir: Know Your App jdcosta profile image JD Costa Author Yeah I guess that's a nice side effect, with Elixir you might get more control over your whole system (including "external" resources like databases) because it's so easy to reason about what is running concurrently. Pretty cool!
global_05_local_5_shard_00002591_processed.jsonl/32210
Document Type Technical Report This paper primarily concerns the study of general classes of constrained multiobjective optimization problems (including those described via set-valued and vector-valued cost mappings) from the viewpoint of modern variational analysis and generalized differentiation. To proceed, we first establish two variational principles for set-valued mappings, which~being certainly of independent interest are mainly motivated by applications to multiobjective optimization problems considered in this paper. The first variational principle is a set-valued counterpart of the seminal derivative-free Ekeland variational principle, while the second one is a set-valued extension of the subdifferential principle by Mordukhovich and Wang formulated via an appropriate subdifferential notion for set-valued mappings with values in partially ordered spaces. Based on these variational principles and corresponding tools of generalized differentiation, we derive new conditions of the coercivity and Palais-Smale types ensuring the existence of optimal solutions to set-valued optimization problems with noncompact feasible sets in infinite dimensions and then obtain necessary optimality and suboptimality conditions for nonsmooth multiobjective optmization problems with general constraints, which are new in both finite-dimensional and infinite-dimensional settings. Number in Series Applied Mathematics | Mathematics Dedicated to Stephan Rolewicz. This research was partly supported by the National Science Foundation under grants DMS-0304989 and DMS-0603846 and by the Australian Research Council under grant DP-0451168.
global_05_local_5_shard_00002591_processed.jsonl/32217
public bool isKinematic ; Controla si las físicas afectan al rigidbody. If isKinematic is enabled, Forces, collisions or joints will not affect the rigidbody anymore. The rigidbody will be under full control of animation or script control by changing transform.position. Kinematic bodies also affect the motion of other rigidbodies through collisions or joints. Eg. can connect a kinematic rigidbody to a normal rigidbody with a joint and the rigidbody will be constrained with the motion of the kinematic body. Kinematic rigidbodies are also particularly useful for making characters which are normally driven by an animation, but on certain events can be quickly turned into a ragdoll by setting isKinematic to false. using UnityEngine; using System.Collections; public class ExampleClass : MonoBehaviour { public Rigidbody rb; // Let the rigidbody take control and detect collisions. void EnableRagdoll() { rb.isKinematic = false; rb.detectCollisions = true; } // Let animation control the rigidbody and ignore collisions. void DisableRagdoll() { rb.isKinematic = true; rb.detectCollisions = false; } }
global_05_local_5_shard_00002591_processed.jsonl/32218
Tag: King Faisal II July 14, 1958 in Iraq-CIA-U.S. Just something to think of as to tomorrow, and our history. A group of Iraqi army officers staged a coup in Iraq and overthrew the monarchy of King Faisal II (who had ascended to the throne at age four). The new government, led by Abdul Karim el Qasim, was ousted in 1963 by a coup helped by the CIA and led by the Arab Socialist Ba’ath Party-later dominated by Saddam Hussein.
global_05_local_5_shard_00002591_processed.jsonl/32262
Want to directly email someone at D Cubedesigns but don't know their address? Don't sweat it, we've got you covered. Get the email address format for people working at We're still trying to figure out the format for email addresses at d-cubedesigns.com for sure. We've got the following addresses though for employees currently at the firm. Does this get you any further on your quest? score 0
global_05_local_5_shard_00002591_processed.jsonl/32266
Download Source Code Nemiro.OAuth 1.10 Aleksey Nemiro is announcing that Nemiro.OAuth with version number 1.10 is already available to download. What is Nemiro.OAuth ? Nemiro.OAuth is Add OAuth and social sign-in support for your .NET projects, working with both OAuth 1.0 and 2.0 protocol versions, and with C# and VB projects . Nemiro.OAuth is a simple C# class that can improve your Web project with automatic OAuth protocol, allowing you to implement a social sign-in system for your projects.Lots of OAuth clients are supported out of the box, but new ones can also be added utilizing Nemiro.OAuth’s base classes.Visual Basic .NET and C# mediums are supported, along with both major versions of the OAuth protocol.Supported OAuth clients:- Amazon- Assembla- CodeProject- Dropbox- Facebook- Foursquare- GitHub- Google- Instagram- LinkedIn- Live- Odnoklassniki- SoundCloud- SourceForge- Tumblr- Twitter- VK- Yahoo- Yandex This is changelog for Nemiro.OAuth version 1.10 : • In the method GetUserInfo added ability to specify an access token; • In the web methods of the OAuthUtility class added ability to specify an access token; • Fixed bug with overwriting the query parameters in obtaining authorization address; • Fixed UserInfo mapper for LinkedIn; Nemiro.OAuth - Nemiro.OAuth is a social sign-in system for .NET projectsNemiro.OAuth - All login operations need to be approved by their respective usersNemiro.OAuth - Once logged in, the Nemiro.OAuth library can also facilitate various API queries Wagiman Wiryosukiro You may also like... %d bloggers like this:
global_05_local_5_shard_00002591_processed.jsonl/32272
Phone: +7-915-423-9555 Bohema Nail glue-gel 3 g картинка Bohema Клей-гель для ногтей 3 г от магазина El Corazon 52.50 rub. 46.20 rub. (Savings - 6.30 rub.) ($ 0.61, € 0.51) Bohema Nail glue-gel 3 g If you need to stick artificial nails, you can use glue-gel "Bohema." What is the difference between glue and glue gel? When you glue artificial nails, the glue can spread under the fingernails and stick out over the nails, forming streaks, which causes certain inconveniences. When you use glue-gel this does not happen - glue-gel is more concentrated and does not spread unlike usual glue. How to use: Apply an even layer of glu-gel to the inside of the artificial nail and wait about 30 seconds. Then attach artificial nails to your natural nail and press gently, holding it for 3 seconds. 46.20 rub. for 1 pcs. - + pcs. Buy Learn more about EL Corazon here: • Comments Loading comments... El Corazon
global_05_local_5_shard_00002591_processed.jsonl/32275
Abu’l-ʿAbbās Aḥmad ibn Jaʿfar (Arabic: أبو العباس أحمد بن جعفر‎; c. 842 – 14 October 892), better known by his regnal name al-Muʿtamid ʿalā ’llāh (المعتمد على الله, "Dependent on God"), was the Caliph of the Abbasid Caliphate from 870 to 892. His reign marks the end of the "Anarchy at Samarra" and the start of the Abbasid restoration, but he was a largely a ruler in name only. Power was held by his brother al-Muwaffaq, who held the loyalty of the military. Al-Mu'tamid's authority was circumscribed further after a failed attempt to flee to the domains controlled by Ahmad ibn Tulun in late 882, and he was placed under house arrest by his brother. In 891, when al-Muwaffaq died, loyalists attempted to restore power to the Caliph, but were quickly overcome by al-Muwaffaq's son al-Mu'tadid, who assumed his father's powers. When al-Mu'tamid died in 892, al-Mu'tadid succeeded him as caliph. Amir al-Mu'minin Dinar of al-Mu'tamid, AH 271.jpg Gold dinar of al-Mu'tamid, minted in 884/5, with the names of al-Muwaffaq and the latter's vizier, Sa'id ibn Makhlad (Dhu'l-Wizaratayn) 15th Caliph of the Abbasid Caliphate Reign16 June 870 — 14 October 892 Bornc. 842 Samarra, Abbasid Caliphate, now Iraq Died14 October 892 (aged 48) Samarra, Abbasid Caliphate, now Iraq ReligionSunni Islam Family tree of the Abbasid caliphs of the ninth century The future al-Mu'tamid was a son of Caliph al-Mutawakkil (r. 847–861) and a Kufan slave girl called Fityan.[1] His full name was Ahmad ibn Abi Jaʿfar, and was also known by the patronymic Abu'l-Abbas and from his mother as Ibn Fityan.[2] After al-Muhtadi was deposed by the Turkish commanders Bayakbak and Yarjukh, he was selected by the military as his successor and proclaimed Caliph with the regnal name al-Muʿtamid ʿAlā ’llāh on 16 or 19 June 870. On 21 June, al-Muhtadi was executed.[3] Reign and relationship with al-MuwaffaqEdit The Qasr al-'Ashiq palace was commissioned under al-Mu'tamid, and was built in 877–882 The accession of al-Mu'tamid brought an end to the turmoils of the "Anarchy at Samarra", which had begun with the murder of al-Mutawakkil in 861. Caliphal authority in the provinces collapsed during that period, with the result that the central government lost effective control over most of the Caliphate outside the metropolitan region of Iraq. In the west, Egypt had fallen under the control of the ambitious Turkish soldier Ahmad ibn Tulun, who also had designs on Syria, while Khurasan and most of the Islamic East had been taken over by the Saffarids under Ya'qub ibn al-Layth, who replaced the Abbasids' loyal client state, the Tahirids. Most of the Arabian peninsula was likewise lost to local potentates, while in Tabaristan a radical Zaydi Shi'a dynasty took power. Even in Iraq, a rebellion of the Zanj slaves had begun and soon threatened Baghdad itself, while further south the Qarmatians were a nascent threat.[4][5][6] In addition, al-Mu'tamid's position was undermined from within, as during the coups of the previous years real power had come to lie with the elite Turkish troops, and with al-Mu'tamid's brother Abu Ahmad Talha, who, as the Caliphate's main military commander, served as the chief intermediary between the caliphal government and the Turks. When Caliph al-Mu'tazz died in 869, there was even popular agitation in Baghdad in favour of his elevation to Caliph.[7][8] In contrast to his brother, al-Mu'tamid appears to have lacked any experience of, and involvement in, politics, as well as a power base he could rely on.[9] At the time al-Muhtadi was killed by the Turks, Abu Ahmad was at Mecca. Immediately he hastened north to Samarra, where he and Musa ibn Bugha effectively sidelined al-Mu'tamid, and assumed control of the government.[10][11] Al-Mu'tamid was thus quickly reduced to a figurehead ruler, which remained the case for the remainder of his reign.[12] Within a short time, Abu Ahmad was conferred an extensive governorate covering most of the lands still under caliphal authority: western Arabia, southern Iraq with Baghdad, and Fars. To denote his authority, he assumed an honorific name in the style of the caliphs, al-Muwaffaq bi-Allah.[10][11] As one of the few vestiges of actual power, al-Mu'tamid retained the right to appoint his own viziers, originally choosing the experienced Ubayd Allah ibn Yahya ibn Khaqan, who had already served al-Mutawakkil. During his caliphate, the Caliph retained some freedom of action, but after his death in 877, he was replaced by al-Muwaffaq's secretary, Sulayman ibn Wahb. Ibn Wahb was soon disgraced and replaced as vizier by Isma'il ibn Bulbul. Real power however lay again with al-Muwaffaq's new secretary, Sa'id ibn Makhlad, until his own disgrace and downfall in 885, after which Ibn Bulbul became the sole vizier to both al-Mu'tamid and al-Muwaffaq.[13] On 20 July 875, al-Mu'tamid formally arranged for the governance of the state and his succession: his underage son Ja'far was given the honorific name al-Mufawwad ila-llah, was named heir-apparent and assigned the western half of the Caliphate—Ifriqiya, Egypt, Syria, the Jazira and Mosul, Armenia, Mihrajanqadhaq and Hulwan— while al-Muwaffaq received the eastern provinces and was named second heir, except for the event that the Caliph died while al-Mufawwad was still a minor. In practice, al-Mufawwad never exercised any real authority, and al-Muwaffaq continued to exercise control over the western provinces as well through his trusted lieutenant Musa ibn Bugha, who was named al-Mufawwad's deputy.[12][14][15] Al-Muwaffaq's power was strengthened by the military threats the Caliphate faced on all fronts, since he commanded the loyalty of the army.[12] In April 876, al-Muwaffaq and Musa ibn Bugha defeated Ya'qub ibn al-Layth's attempt to capture Baghdad at the Battle of Dayr al-'Aqul and saved the Caliphate from collapse.[16][17] The repulse of the Saffarids then allowed the Abbasids to concentrate their resources in suppressing the Zanj Revolt in the south. The Zanj rebels had managed to capture much of lower Iraq, and inflicted several defeats on the Abbasid troops. In 879, al-Muwaffaq's son Abu'l-Abbas, the future Caliph al-Mu'tadid (r. 892–902), was given the command against the Zanj, and in the next year, al-Muwaffaq himself joined the campaign. In a succession of engagements in the marshes of southern Iraq, the Abbasid forces drove back the Zanj towards their capital, Mukhtara, which fell in August 883.[8][18] Ibn Tulun and al-Mu'tamid's attempted flight to EgyptEdit Gold dinar, minted in Fustat in 881/2, in the name of al-Mu'tamid, al-Mufawwad, and the ruler of Egypt Ahmad ibn Tulun At the same time, al-Muwaffaq also had to contend with the ambitions of Ahmad ibn Tulun in the western provinces. Ibn Tulun and the Abbasid regent fell out in 875/6, on the occasion of a large remittance of revenue from Egypt to the central government. Counting on the rivalry between the Caliph and his over-mighty brother to maintain his own position, Ibn Tulun forwarded a larger share of the taxes to al-Mu'tamid instead of al-Muwaffaq: 2.2 million gold dinars went to the Caliph and only 1.2 million dinars to his brother.[19] Al-Muwaffaq, who in his fight against the Zanj considered himself entitled to the major share of the provincial revenues, was angered by this, and by the implied machinations between Ibn Tulun and his brother. Al-Muwaffaq nominated Musa ibn Bugha as governor of Egypt and sent him with troops to Syria, but a lack of funds led to the expedition's failure before even reaching Egypt.[20][15] In a public gesture of support for al-Mu'tamid and opposition to al-Muwaffaq, Ibn Tulun assumed the title of "Servant of the Commander of the Faithful" (mawlā amīr al-muʾminīn) in 878.[19] With the support of al-Mu'tamid, in 877/8 Ibn Tulun managed to be assigned responsibility for the entirety of Syria and the Cilician frontier zone (Thughur) with the Byzantine Empire.[19] In 881, Ibn Tulun added his own name to coins issued by the mints under his control, along with those of the Caliph and heir apparent, al-Mufawwad.[21] In the autumn of 882, the Tulunid general Lu'lu' defected to the Abbasids, and the cities of the Thughur rejected Tulunid rule, forcing Ibn Tulun to go once again in person to Syria.[22] Al-Mu'tamid used the moment to escape from his confinement in Samarra, and with a small entourage made for Tulunid domains. Messengers from the Caliph reached Ibn Tulun at Damascus, and the ruler of Egypt halted and awaited the Caliph's arrival with great anticipation: not only would the sole source of political legitimacy in the Muslim world reside under his control, but he would also be able to pose as the "rescuer" of the Caliph from his overreaching brother.[23][21] In the event, however, Sa'id ibn Makhlad managed to alert the governor of Mosul, Ishaq ibn Kundaj, who overtook and defeated al-Mu'tamid and his escort at al-Haditha on the Euphrates. Al-Mu'tamid was brought back to Samarra (February 883), where he was placed under virtual house arrest in the Jawsak Palace. In May/June, he was even moved south to Wasit, where al-Muwaffaq could keep an eye on him in person. Only in March 884 was the powerless Caliph allowed to return to Samarra. In the meantime, he was obliged to denounce Ibn Tulun, and appoint—nominally at least—Ishaq ibn Kundaj as governor of Syria and Egypt.[12][23] In 886/7, the Caliph conferred the title of "king" on the long-time ruler of Armenia, Ashot I (r. 862–890). Although the Armenian king continued to pay tribute to the Abbasid court and recognize its suzerainty, both he and the various minor Armenian princes were de facto independent monarchs.[24] Rise of al-Mu'tadid and deathEdit Map of the Abbasid Caliphate in the final year of al-Mu'tadid's reign: areas under direct Abbasid control in dark green, areas under loose Abbasid suzerainty, but under autonomous governors or rebels, in light green In 889, al-Muwaffaq fell out with his son, Abu'l-Abbas, for reasons that are unclear, and had him imprisoned. Al-Muwaffaq spent the next two years on campaign in the Jibal. By the time he returned to Baghdad in May 891, al-Muwaffaq was already nearing death. The garrison commander of Baghdad, and the vizier Isma'il ibn Bulbul, hatched a plot to keep Abu'l-Abbas imprisoned and allow power to pass to al-Mu'tamid. Therefore, they invited the Caliph and his son to come the city, which they did. In the event, however, the attempt to sideline Abu'l-Abbas failed, due to his popularity with the soldiers and the common people: the soldiers set him free, and when al-Muwaffaq died on 2 June, Abu'l-Abbas immediately assumed his father's position.[25] Abu'l-Abbas assumed the title of al-Mu'tadid bi-llah and took his father's position in the line of succession after the Caliph and al-Mufawwad.[12] The powerless al-Mufawwad was pushed aside on 30 April 892,[26] and when al-Mu'tamid died on 14 October 892,[27] "apparently as a result of a surfeit of drink and food" (Hugh N. Kennedy), al-Mu'tadid took power as caliph.[12][28] 1. ^ Kennedy 1993, p. 765. 2. ^ Waines 1992, pp. 68 (note 244), 115. 3. ^ Waines 1992, pp. 93–99, 115. 4. ^ Mottahedeh 1975, pp. 77–78. 5. ^ Bonner 2010, pp. 313–327. 6. ^ Kennedy 2001, p. 148. 7. ^ Kennedy 2001, pp. 148–150. 8. ^ a b Bonner 2010, pp. 323–324. 9. ^ Kennedy 1993, pp. 765–766. 10. ^ a b Kennedy 1993, p. 801. 11. ^ a b Kennedy 2001, p. 149. 12. ^ a b c d e f Kennedy 1993, p. 766. 13. ^ Kennedy 2004, p. 174. 14. ^ Waines 1992, pp. 166–167. 15. ^ a b Bonner 2010, pp. 320–321. 16. ^ Bonner 2010, p. 316. 17. ^ Bosworth 1975, pp. 113–114. 18. ^ Kennedy 2001, pp. 153–156. 19. ^ a b c Bianquis 1998, p. 95. 20. ^ Bianquis 1998, pp. 95, 98–99. 21. ^ a b Hassan 1960, p. 279. 22. ^ Bianquis 1998, pp. 100–101. 23. ^ a b Bianquis 1998, p. 101. 24. ^ Canard 1960, p. 637. 25. ^ Kennedy 2001, pp. 152–153. 26. ^ Fields 1987, p. 176. 27. ^ Fields 1987, p. 178. 28. ^ Bonner 2010, p. 332. • Bianquis, Thierry (1998). "Autonomous Egypt from Ibn Ṭūlūn to Kāfūr, 868–969". In Petry, Carl F. (ed.). Cambridge History of Egypt, Volume One: Islamic Egypt, 640–1517. Cambridge: Cambridge University Press. pp. 86–119. ISBN 0-521-47137-0. • Canard, Marius (1960). "Armīniya, II. History 2. — Armenia under Arab domination". In Gibb, H. A. R.; Kramers, J. H.; Lévi-Provençal, E.; Schacht, J.; Lewis, B. & Pellat, Ch. (eds.). The Encyclopaedia of Islam, New Edition, Volume I: A–B. Leiden: E. J. Brill. pp. 635–638. OCLC 495469456. • Bonner, Michael (2010). "The waning of empire, 861–945". In Robinson, Chase F. (ed.). The New Cambridge History of Islam, Volume 1: The Formation of the Islamic World, Sixth to Eleventh Centuries. Cambridge: Cambridge University Press. pp. 305–359. ISBN 978-0-521-83823-8. Born: 844 Died: 892 Sunni Islam titles Preceded by Abbasid Caliph 16/19 June 870 — 14 October 892 Succeeded by
global_05_local_5_shard_00002591_processed.jsonl/32276
Gandhi (film) Theatrical release poster Directed byRichard Attenborough Produced byRichard Attenborough Written byJohn Briley Music by Edited byJohn Bloom Distributed byColumbia Pictures Release date • 30 November 1982 (1982-11-30) (New Delhi) • 3 December 1982 (1982-12-03) (United Kingdom) • 8 December 1982 (1982-12-08) (United States) Running time 191 minutes[1] • United Kingdom • India Budget$22 million[2] Box office$127.8 million[2] Gandhi was released in India on 30 November 1982, in the United Kingdom on 3 December, and in the United States on 8 December. It was praised for a historically accurate portrayal of the life of Gandhi, the Indian independence movement and the deteriorating results of British colonisation on India, and also for Kingsley's performance, its production values and costume design. It became a commercial success grossing $127.8 million on a $22 million budget. The film received a leading eleven nominations at the 55th Academy Awards, winning eight (more than any other film nominated that year), including for the Best Picture, Best Director, and Best Actor (for Kingsley). The film was screened retrospectively on 12 August 2016 as the opening film at the Independence Day Film Festival jointly presented by the Indian Directorate of Film Festivals and Ministry of Defence, commemorating the 70th Indian Independence Day.[3][4][5] The British Film Institute ranked Gandhi as the 34th greatest British film of the 20th century. On 30 January 1948,[6] after an evening prayer, an elderly Gandhi is helped out for his evening walk to meet a large number of greeters and admirers. One visitor, Nathuram Godse, shoots him point blank in the chest. Gandhi exclaims, "Oh, God!", and then falls dead. In 1893, the 23-year-old Gandhi is thrown off a South African train for being an Indian sitting in a first-class compartment despite having a first-class ticket.[7] Realising the laws are biased against Indians, he then decides to start a non-violent protest campaign for the rights of all Indians in South Africa. After numerous arrests and unwelcome international attention, the government finally relents by recognising some rights for Indians.[8] In 1915, as a result of his victory in South Africa, Gandhi is invited back to India, where he is now considered something of a national hero. He is urged to take up the fight for India's independence (Swaraj, Quit India) from the British Empire. Gandhi agrees, and mounts a non-violent non-cooperation campaign of unprecedented scale, coordinating millions of Indians nationwide. There are some setbacks, such as violence against the protesters, Gandhi's occasional imprisonment, and the 1919 Jallianwala Bagh massacre. Nevertheless, the campaign generates great attention, and Britain faces intense public pressure. In 1930, Gandhi protests against the British-imposed salt tax via the highly symbolic Salt March. He also travels to London for a conference concerning Britain's possible departure from India; this, however, proves fruitless. After the Second World War,[9] India finally wins it's independence.[10] Indians celebrate this victory, but their troubles are far from over. The country is subsequently divided by religion. It is decided that the northwest area and the eastern part of India (current-day Bangladesh), both places where Muslims are in the majority, will become a new country called Pakistan. It is hoped that by encouraging the Muslims to live in a separate country, violence will abate. Gandhi is opposed to the idea, and is even willing to allow Muhammad Ali Jinnah to become the first Prime Minister of India,[11] but the Partition of India is carried out nevertheless. Religious tensions between Hindus and Muslims erupt into nationwide violence. Horrified, Gandhi declares a hunger strike, saying he will not eat until the fighting stops.[12] The fighting does stop eventually. Gandhi spends his last days trying to bring about peace between both nations. He, thereby, angers many dissidents on both sides, one of whom (Godse) is involved in a conspiracy to assassinate him.[13] Gandhi is cremated and his ashes are scattered on the holy Ganga.[14] As this happens, viewers hear Gandhi in another voiceover from earlier in the film. Rohini Hattangadi won for her role as Kasturba Gandhi in this movie, becoming the first Indian actress to win a British Academy Film Award. This film had been Richard Attenborough's dream project, although two previous attempts at filming had failed. In 1952, Gabriel Pascal secured an agreement with the Prime Minister of India (Jawaharlal Nehru) to produce a film of Gandhi's life. However, Pascal died in 1954 before preparations were completed.[15] In 1962 Attenborough was contacted by Motilal Kothari, an Indian-born civil servant working with the Indian High Commission in London and a devout follower of Gandhi. Kothari insisted that Attenborough meet him to discuss a film about Gandhi.[16][17] Attenborough agreed, after reading Louis Fischer's biography of Gandhi and spent the next 18 years attempting to get the film made. He was able to meet prime minister Nehru and his daughter Indira Gandhi through a connection with Lord Louis Mountbatten, the last Viceroy of India. Nehru approved of the film and promised to help support its production, but his death in 1964 was one of the film's many setbacks. Attenborough would dedicate the film to the memory of Kothari, Mountbatten, and Nehru. David Lean and Sam Spiegel had planned to make a film about Gandhi after completing The Bridge on the River Kwai, reportedly with Alec Guinness as Gandhi. Ultimately, the project was abandoned in favour of Lawrence of Arabia (1962).[18] Attenborough reluctantly approached Lean with his own Gandhi project in the late 1960s, and Lean agreed to direct the film and offered Attenborough the lead role. Instead Lean began filming Ryan's Daughter, during which time Motilai Kothari had died and the project fell apart.[19] Attenborough again attempted to resurrect the project in 1976 with backing from Warner Brothers. Then prime minister Indira Gandhi declared a state of emergency in India and shooting would be impossible. Co-producer Rani Dube persuaded prime minister Indira Gandhi to provide the first $10 million from the National Film Development Corporation of India, chaired by D. V. S. Raju at that time, on the back of which the remainder of the funding was finally raised.[20][21] Finally in 1980 Attenborough was able to secure the remainder of the funding needed to make the film. Screenwriter John Briley had introduced him to Jake Eberts, the chief executive at the new Goldcrest production company that raised approximately two-thirds of the film's budget. Shooting began on 26 November 1980 and ended on 10 May 1981. Some scenes were shot near Koilwar Bridge, in Bihar.[22] Over 300,000 extras were used in the funeral scene, the most for any film, according to Guinness World Records.[23] During pre-production, there was much speculation as to who would play the role of Gandhi.[24][25] The choice was Ben Kingsley, who is partly of Indian heritage (his father was Gujarati and his birth name is Krishna Bhanji).[26] Gandhi premiered in New Delhi, India on 30 November 1982. Two days later, on 2 December, it had a Royal Premiere at the Odeon Leicester Square in London[27] in the presence of Prince Charles and Princess Diana.[28][29] The film had a limited release in the US on Wednesday, 8 December 1982, followed by a wider release in January 1983.[2] Box officeEdit The film grossed $183,583 in its first 5 days from 4 theatres (Ziegfeld Theatre in New York City; Uptown Theater in Washington D.C.; Century Plaza in Los Angeles; and the York in Toronto)[30] in North America. Due to the running time, it could be shown only three times a day.[31] It went on to gross US$52,767,889 in the United States and Canada,[2] the 12th highest-grossing film of 1982.[32] Outside of North America, the film grossed US$75 million in the rest of the world. It was the year's third highest-grossing film outside of North America.[2] In the United Kingdom, the film grossed £7.7 million.[33][34] It is one of the top ten highest-grossing British independent films of all time adjusted for inflation.[33] In India, it was one of the highest-grossing films of all-time (and the highest for a foreign film) during the time of its release by earning over 100 crore or 1 billion rupees. At today's exchange rate, that amounts to US$14.9 million, still making it one of the highest-grossing imported films in the country. It was shown tax free in Bombay (known as Mumbai since 1995) and Delhi.[35] Goldcrest Films invested £5,076,000 in the film and received £11,461,000 in return, earning them a profit of £6,385,000.[36] Critical responseEdit Reviews were broadly positive not only domestically (in India) but also internationally.[35] The film was discussed or reviewed in Newsweek,[24] Time,[37] the Washington Post,[38][39] The Public Historian,[40] Cross Currents,[41] The Journal of Asian Studies,[42] Film Quarterly,[43] The Progressive,[44] The Christian Century[44] and elsewhere.[45] Ben Kingsley's performance was especially praised. Among the few who took a more negative view of the film, historian Lawrence James called it "pure hagiography"[46] while anthropologist Akhil Gupta said it "suffers from tepid direction and a superficial and misleading interpretation of history."[47] The film was also criticised by some right-wing commentators who objected to the film's advocacy of nonviolence, including Pat Buchanan, Emmett Tyrrell, and especially Richard Grenier.[44][48] In Time, Richard Schickel wrote that in portraying Gandhi's "spiritual presence... Kingsley is nothing short of astonishing."[37]:97 A "singular virtue" of the film is that "its title figure is also a character in the usual dramatic sense of the term." Schickel viewed Attenborough's directorial style as having "a conventional handsomeness that is more predictable than enlivening," but this "stylistic self-denial serves to keep one's attention fastened where it belongs: on a persuasive, if perhaps debatable vision of Gandhi's spirit, and on the remarkable actor who has caught its light in all its seasons."[37]:97 Roger Ebert gave the film four stars and called it a "remarkable experience",[49] and placed it 5th on his 10 best films of 1983.[50] In Newsweek, Jack Kroll stated that "There are very few movies that absolutely must be seen. Sir Richard Attenborough's Gandhi is one of them."[24] The movie "deals with a subject of great importance... with a mixture of high intelligence and immediate emotional impact... [and] Ben Kingsley... gives what is possibly the most astonishing biographical performance in screen history." Kroll stated that the screenplay's "least persuasive characters are Gandhi's Western allies and acolytes" such as an English cleric and an American journalist, but that "Attenborough's 'old-fashioned' style is exactly right for the no-tricks, no-phony-psychologizing quality he wants."[24] Furthermore, Attenborough mounts a powerful challenge to his audience by presenting Gandhi as the most profound and effective of revolutionaries, creating out of a fierce personal discipline a chain reaction that led to tremendous historical consequences. At a time of deep political unrest, economic dislocation and nuclear anxiety, seeing "Gandhi" is an experience that will change many minds and hearts.[24] According to the Museum of Broadcast Communications there was "a cycle of film and television productions which emerged during the first half of the 1980s, which seemed to indicate Britain's growing preoccupation with India, Empire and a particular aspect of British cultural history".[51] In addition to Gandhi, this cycle also included Heat and Dust (1983), Octopussy (1983), The Jewel in the Crown (1984), The Far Pavilions (1984) and A Passage to India (1984). Patrick French negatively reviewed the film, writing in The Telegraph: Richard Grenier in his 1983 article, The Gandhi Nobody Knows, which was also the title of the book of the same name and topic, also criticised the film, arguing it misportrayed him as a "saint". He also alleged the Indian government admitted to financing about a third of the film's budget.[53] Grenier's book later became an inspiration for G. B. Singh's book Gandhi: Behind the Mask of Divinity. Parts of the book also discuss the film negatively. Singh, a long term critic of Gandhi, also went on to co-author Gandhi Under Cross Examination with Timothy Watson. In the DVD edition of the 1998 film Jinnah, the director's commentary of the film makes mention of the 1982 film. In the commentary, both Sir Christopher Lee, who portrayed the older Muhammed Ali Jinnah, and director Jamil Dehlavi criticised the film Gandhi for its portrayal of Jinnah, arguing it to be demonising and historically inaccurate. Review aggregator website Rotten Tomatoes retrospectively collected 59 reviews and judged 85% of them to be positive, with an average rating of 8.15/10. The website's critical consensus reads: "Director Richard Attenborough is typically sympathetic and sure-handed, but it's Ben Kingsley's magnetic performance that acts as the linchpin for this sprawling, lengthy biopic."[54] Metacritic gave the film a score of 79 out of 100 based on 16 critical reviews, indicating "generally favorable reviews".[55] CinemaScore reported that audiences gave the film a rare "A+" grade.[56] In 2010, the Independent Film & Television Alliance selected the film as one of the 30 Most Significant Independent Films of the last 30 years.[57] Awards and nominationsEdit Award Category Recipients Result Academy Awards[58] Best Picture Richard Attenborough Won Best Director Won Best Actor Ben Kingsley Won Best Screenplay – Written Directly for the Screen John Briley Won Best Art Direction Stuart Craig, Robert W. Laing and Michael Seirton Won Best Cinematography Billy Williams and Ronnie Taylor Won Best Costume Design John Mollo and Bhanu Athaiya Won Best Film Editing John Bloom Won Best Makeup Tom Smith Nominated Best Original Score Ravi Shankar and George Fenton Nominated Best Sound Gerry Humphreys, Robin O'Donoghue, Jonathan Bates and Simon Kaye Nominated American Cinema Editors Awards Best Edited Feature Film John Bloom Won British Academy Film Awards Best Film Richard Attenborough Won Best Direction Won Best Actor in a Leading Role Ben Kingsley Won Best Actor in a Supporting Role Edward Fox Nominated Roshan Seth Nominated Best Actress in a Supporting Role Candice Bergen Nominated Rohini Hattangadi Won Best Screenplay John Briley Nominated Best Cinematography Billy Williams and Ronnie Taylor Nominated Best Costume Design John Mollo and Bhanu Athaiya Nominated Best Film Editing John Bloom Nominated Best Make Up Artist Tom Smith Nominated Best Production Design/Art Direction Stuart Craig Nominated Best Score Ravi Shankar and George Fenton Nominated Best Sound Gerry Humphreys, Robin O'Donoghue and Jonathan Bates and Simon Kaye Nominated Most Promising Newcomer to Leading Film Roles Ben Kingsley Won British Society of Cinematographers Best Cinematography Billy Williams and Ronnie Taylor Won David di Donatello Awards Best Foreign Film Richard Attenborough Won Best Foreign Producer Won Best Foreign Screenplay John Briley Nominated European David Award Richard Attenborough Won Directors Guild of America Awards Outstanding Directorial Achievement in Motion Pictures Won Evening Standard British Film Awards Best Actor Ben Kingsley Won Golden Globe Awards Best Foreign Film Gandhi Won Best Actor in a Motion Picture – Drama Ben Kingsley Won Best Director – Motion Picture Richard Attenborough Won Best Screenplay – Motion Picture John Briley Won New Star of the Year – Actor Ben Kingsley Won Grammy Awards Best Album of Original Score Written for a Motion Picture or Television Special Ravi Shankar and George Fenton Nominated Japan Academy Film Prize Outstanding Foreign Language Film Gandhi Nominated Kansas City Film Critics Circle Awards Best Actor Ben Kingsley Won London Film Critics' Circle Awards Actor of the Year Won Los Angeles Film Critics Association Awards Best Film Gandhi 2nd Place Best Director Richard Attenborough 2nd Place Best Actor Ben Kingsley Won National Board of Review Awards Best Film Gandhi Won Top Ten Films Won Best Actor Ben Kingsley Won National Society of Film Critics Awards Best Actor 2nd Place New York Film Critics Circle Awards Best Film Gandhi Won Best Actor Ben Kingsley Won See alsoEdit 1. ^ "Gandhi". British Board of Film Classification. Retrieved 9 January 2015. 2. ^ a b c d e "Gandhi (1982) - Box Office Data, DVD and Blu-ray Sales, Movie News, Cast and Crew Information". The Numbers. Retrieved 27 January 2015. 3. ^ 4. ^ "Independence Day Film Festival" (PDF). Archived from the original (PDF) on 9 September 2016. Retrieved 29 August 2016. 5. ^ 6. ^ pp. 18–21, Briley (1983). 7. ^ pp. 21–24, Briley (1983). 8. ^ Briley (1983), p. 54, represents Gandhi's final victory in South Africa by depicting General Smuts as telling Gandhi, "a Royal Commission to 'investigate' the new legislation.... I think I could guarantee they would recommend the Act be repealed.... You yourself are free from this moment.". 9. ^ Second World War is alluded to in three scenes in the film. Briley (1983) first presents Gandhi, soon after his return from London in the early 1930, as saying "They are preparing for war. I will not support it, but I do not intend to take advantage of their danger" (p. 146). Second, after war is underway (as indicated by a newspaper headline), Gandhi is prevented by the British from speaking when he says he will "speak against war" (p. 147); Kasturba then tells the British: "If you take my husband, I intend to speak in his place" (p. 147), although she too is prevented from speaking. Third, Margaret Bourke-White and Gandhi discuss whether nonviolence could be effective against Hitler (Gandhi says: "What you cannot do is accept injustice. From Hitler – or anyone...", p. 151). 10. ^ The British commitment to support Indian independence is indicated in the first scene set after WWII, in which Mountbatten arrives at Delhi Airport and then, in press conference, announces: "We have come to crown victory with friendship – to assist at the birth of an independent India and to welcome her as an equal member in the British Commonwealth of Nations... I am here to see that I am the last British Viceroy" (Briley, 1983, p. 155). 11. ^ Briley (1983), Gandhi to Jinnah: "I am asking Panditji to stand down. I want you to be the first Prime Minister of India" (p. 158). 12. ^ In Briley (1983), Gandhi mentions he is on a "fast" (p. 168), and later says that he wants "That the fighting will stop – that you make me believe it will never start again" (p. 172). 13. ^ Briley (1983), p. 179. 14. ^ Briley (1983), p. 180; in the movie/screenplay, the river is not identified. 15. ^ See Pascal, Valerie (1970). The disciple and his devil: Gabriel Pascal, Bernard Shaw. New York: McGraw-Hill. ISBN 978-0-595-33772-9. Page 219 states that "Nehru had given his consent, which he confirmed later in a letter to Gabriel: 'I feel... that you are the man who can produce something worthwhile. I was greatly interested in what you told me about this subject [the Gandhi film] and your whole approach to it." 16. ^ "Gandhi's Inspiring Short Stories". Retrieved 10 May 2018. 17. ^ Wakeman, John. World Film Directors, Volume 2. The H. W. Wilson Company, 1988, p. 79. 18. ^ Entirely Up To You, Darling by Diana Hawkins & Richard Attenborough; paperback; Arrow Books; published 2009. ISBN 978-0-099-50304-0 19. ^ Wakeman (1988), p. 81. 20. ^ Wakeman (1988), p. 82. 21. ^ Special Correspondent. "Film producer D.V.S. Raju passes away". The Hindu. 22. ^ "The ancient heritage behind our railway bridges". Rediff. 23. ^ "Arts and media/Movies/Film extras". Guinness World Records. Archived from the original on 26 November 2005. Retrieved 27 October 2007. 24. ^ a b c d e Jack Kroll (1982). "A magnificent life of Gandhi". Newsweek (13 December 1982): 60. 25. ^ Kroll (1982, p. 60) mentions advocacy of Alec Guinness, John Hurt, and Dustin Hoffman, and quotes Attenborough as stating that "At one point Paramount actually said they'd give me the money if Richard Burton could play Gandhi." 26. ^ See Jack Kroll (1982). "To be or not to be... Gandhi". Newsweek [US edition] (13 December 1982): 63. – "Born Krishna Bhanji, Kingsley changed his name when he became an actor: the Kingsley comes from his paternal grandfather, who became a successful spice trader in East Africa and was known as King Clove." 27. ^ Nigel Wolland. "70mm at the Odeon, Leicester Square". In Retrieved 26 August 2012. 28. ^ "Entertainments Guide". The Guardian. 2 December 1982. p. 24. 29. ^ "Attending premiere of "Gandhi" December 2nd 1982". Princess Diana Remembered. 2 December 1982. Retrieved 26 August 2012. 30. ^ "Major Openings Bolster B.O.". Daily Variety. 14 December 1982. p. 1. 31. ^ Ginsberg, Steven (21 December 1982). "'Tootsie,' 'Toy' And 'Dark Crystal' Win Big At National Box-Office". Daily Variety. p. 1. 32. ^ "1982 Domestic Grosses". Box Office Mojo. Retrieved 29 January 2012. 33. ^ a b "BFI Research and Statistics" (PDF). British Film Institute. April 2016. £22.3 million inflation-adjusted; GDP deflator 34.558 34. ^ "Pacific Exchange Rate Service (0.57245 GBP per USD)" (PDF). UBC Sauder School of Business. University of British Columbia. 1982. Retrieved 21 November 2017. 35. ^ a b Makarand R Paranjape (30 January 2015). The Death and Afterlife of Mahatma Gandhi. ISBN 9788184006834. Retrieved 14 July 2016. 36. ^ Eberts, Jake; Illott, Terry (1990). My indecision is final. Faber and Faber. p. 656. 37. ^ a b c Richard Schickel (6 December 1982). "Cinema: Triumph of a martyr [review of Gandhi, film by Richard Attenborough]". Time. 120: 97. 38. ^ Christian Williams (6 December 1982). "Passage to 'Gandhi'; Attenborough's struggle to bring the Mahatma's life to the screen". Washington Post. pp. Show, F1. 39. ^ Coleman McCarthy (2 January 1983). "'Gandhi': Introduction to a moral teacher". Washington Post. pp. Style, K2. 40. ^ Stephen Hay (1983). "Review: Attenborough's "Gandhi"". The Public Historian. University of California Press on behalf of the National Council on Public History. 5 (3): 85–94. doi:10.2307/3377031. ISSN 0272-3433. JSTOR 3377031. 41. ^ Eknath Easwaran (1982). "Gandhi – Reflections After the Film". Cross Currents. Convergence. 32 (4): 385–388. ISSN 0011-1953. 42. ^ Mark Juergensmeyer (1984). "Review: The Gandhi revival—a review article". The Journal of Asian Studies. Association for Asian Studies. 43 (2): 293–298. doi:10.2307/2055315. ISSN 0021-9118. JSTOR 2055315. 43. ^ Darius Cooper (1983). "Untitled [review of Gandhi by Richard Attenborough]". Film Quarterly. University of California Press. 37 (2): 46–50. doi:10.2307/3697391. ISSN 0015-1386. JSTOR 3697391. 44. ^ a b c DeParle, Jason (September 1983). "Why Gandhi Drives The Neoconservatives Crazy". The Washington Monthly: 46–50. 45. ^ Roger Ebert (1 January 1982). "Gandhi [review of film by Richard Attenborough]". Chicago Sun-Times. pp. online film review. Retrieved 31 October 2020. 46. ^ James, Lawrence (1997). Raj: The Making and Unmaking of British India. Little, Brown, and Company. p. 465. ISBN 0-312-19322-X. 47. ^ Akhil Gupta (1983). "Review: Attenborough's truth: The politics of Gandhi" (PDF). The Threepenny Review. Threepenny Review (15): 22–23. ISSN 0275-1410. JSTOR 4383242. Archived from the original (PDF) on 3 March 2016. 48. ^ Grenier, Richard (1983). The Gandhi Nobody Knows. Nashville: Thomas Nelson Publishers. ISBN 0-8407-5871-5. 49. ^ Ebert, Roger (1 January 1982). "Gandhi (1982)". The Chicago Sun-Times. Retrieved 10 December 2015. 50. ^ Ebert's 10 Best Lists: 1967 to Present. Roger Ebert of The Chicago Sun-Times via the Internet Archive. Retrieved 18 October 2016. 51. ^ JEWEL IN THE CROWN, Museum of Broadcast Communication 52. ^ "Gandhi, film review: 'amazing epic'". Martin Chilton. The Telegraph. 53. ^ "The Gandhi Nobody Knows". Richard Grenier. Commentary magazine. Archived from the original on 26 February 2009. 54. ^ "Gandhi (1985)". Rotten Tomatoes. Fandango Media. Retrieved 14 July 2019. 55. ^ "Gandhi Reviews". Metacritic. CBS Interactive. Retrieved 1 March 2018. 56. ^ Pamela McClintock (19 August 2011). "Why CinemaScore Matters for Box Office". The Hollywood Reporter. Retrieved 14 September 2016. 57. ^ "UPDATE: How "Toxic" Is IFTA's Best Indies?". Deadline. Retrieved 23 January 2017. 58. ^ "The 55th Academy Awards (1983) Nominees and Winners". Retrieved 9 October 2011. Further reading • Attenborough, Richard. In Search of Gandhi (1982), memoir on making the film • Hay, Stephen. "Attenborough's 'Gandhi,'" The Public Historian, 5#3 (1983), pp. 84–94 in JSTOR; evaluates the film's historical accuracy and finds it mixed in the first half of the film and good in the second half External linksEdit
global_05_local_5_shard_00002591_processed.jsonl/32281
From WikiFur, the furry encyclopedia. Jump to: navigation, search Never Forget Mappy! Mappy is a 1983 arcade game by Namco. In the U.S. it was manufactured and distributed by Bally/Midway. Mappy is a side-scrolling maze game that features cute cartoony characters. It was re-released as part of the Famicom Mini Series in 2004, only in Japan. Game play[edit] The player guides Mappy the police mouse through the mansion of the Mewkies (kittens) to retrieve stolen goods. The mansion has six floors of long hallways in which the items are stashed. Mappy and the Mewkies can move between the floors by jumping on trampolines at the ends and middle of the hallways, and landing on a floor on the way up (but not on the way down). In addition to the Mewkies, there is also Nyamco (the boss cat) on the level. If Mappy tarries too long, the fearsome ancestral cat coin shows up. A level is completed when all the loot is retrieved. Many of the hallways have doors which Mappy can slam open or shut to temporarily knock out the Mewkies or Nyamco. Some of these are special "microwave doors" which release a wave which sweeps away any cat in its path (even off the edge of the screen.) If Mappy gets caught by the Mewkies or Nyamco in the hallways he dies. However he can safely pass them in the air while jumping on the trampolines. If Mappy bounces on a trampoline four consecutive times without landing on a floor, it breaks, and he dies unless there is another trampoline underneath. The third level and every fourth level after that is a Bonus stage. Mappy, unbothered by the cats, must bounce across a series of trampolines, popping suspended balloons along the way. A bonus is awarded if all the balloons are popped before the music ends. The player uses a left-right joystick to move Mappy and a single button to operate the doors. Ports and Sequels[edit] The only major port of Mappy was a sequel called Mappy Land, which was ported to the Nintendo Entertainment System circa 1986. In the late 90s, it was, however, released as part of Microsoft's Revenge of the Arcade collection. Also, Mappy had several Japan-only sequels, including Hopping Mappy in 1986 for the arcades and also something called Mappy Kids for the Famicom in the late 1980s. There is even a Do It Yourself version called Mappy Arrangement also from the late 1980s. • Nyamco was renamed "Goro" in the U.S. release. External Link[edit]
global_05_local_5_shard_00002591_processed.jsonl/32283
Also found in: Dictionary, Thesaurus, Medical, Wikipedia. Related to Folliculitis: folliculitis decalvans Inflammation of a follicle or group of follicles. an inflammation of a hair follicle caused primarily by staphylococci. Symptoms of folliculitis are redness and swelling, followed by the formation of a nodule having on its surface a pustule pierced by the hair. When only the orifice of the follicle is affected, ostial folliculitis results, which is usually resolved within a few days. A deep folliculitis, or a furuncle, develops when the tissues surrounding a follicle also become inflamed. Treatment consists of wiping the skin around the pustules with a 2 percent solution of salicylic acid or camphor and covering them with a 2 percent solution of brilliant green or methylene blue. References in periodicals archive ? It was reported that TC may mimic variable forms of folliculitis such as bacterial folliculitis (25), tufted hair folliculitis (26), and folliculitis decalvans (27). Symptoms of folliculitis vary from person to person and there are varying degrees of severity. Specific dermatoses of pregnancy observed during the study were prurigo of pregnancy, dermatoses with intrahepatic cholestasis of pregnancy, polymorphic eruption of pregnancy and pruritic folliculitis of pregnancy. Among fungal infections, candidal infection was most commonly reported (10.3%) followed by dermatophytic infection (9%) and pityriasis versicolor (4.7%), while among bacterial infections, folliculitis (3.7%) and furuncle (2.7%) were mainly reported. Impetigo formed the largest group followed by folliculitis and carbuncle. Perforating folliculitis is characterized by adult-onset scaly follicular papules with a white central keratotic plug (may contain curled hair) on the extensor surfaces of the extremities and buttocks. A significant relationship was found between folliculitis and furunculosis with the underlying disorder (P=0.039 in both). If a female patient complains of recurrent folliculitis of the lower legs, ask if she's had a pedicure lately and if she shaves her legs before going to the nail salon. Nasal folliculitis. This is a deep infection of the bridge of the nose that can extend around the nostrils.
global_05_local_5_shard_00002591_processed.jsonl/32285
Monday, 7 May 2012 Do microwave ovens save energy? I used to think that cooking with a microwave uses less energy than cooking on a hob but in practice this is not always the case - it depends on what you are cooking. In comparison to a gas hob, the microwave oven can also cost more and generate more carbon emissions even when using the same amount of energy, because gas is cheaper than electricity and is less carbon intensive. Of course the microwave can be more convenient, even when it is less efficient. I've been investigating which jobs the microwave is good for and why it isn't as efficient as you might think. Microwave ovens are supposed to be efficient because they heat food directly. This is because the oven generates microwaves which interact specifically with the food, especially water, exciting the molecules which raises the temperature. However, although the microwave heating mechanism is very efficient the process of generating the microwaves is less so - probably only about 65% of the electric energy used by the oven is converted to microwave energy and heats the food (1). This is staggeringly more efficient than a conventional oven, which has an efficiency around 10% (2). However, when the microwave competes with cooking on the hob the result is less clear cut. A gas hob is typically about 33% efficient but an induction hob can be up to 90% efficient. So the induction hob beats the microwave on energy use and the gas hob wins on cost and carbon emissions, other things being equal. However, you also need to take into account what you are heating. In 2006 DEFRA commissioned some tests to determine how much energy microwave ovens could save, compared to an electric oven or hob, and found huge variation between different tasks (3). The following table summarises my findings which I discuss in more detail below. Defrost***The microwave is convenient but with a bit of forethought you can do this with no energy at all. Heating Liquids****Heating up liquids in a saucepan is usually more energy efficient except for very small amounts. Heating Solids****Microwaves are very good for heating solids which contain some water. Cooking vegetables****Boiling vegetables in water takes up to 4 times as much energy as cooking in a microwave with a minimum of water. Defrosting foods Microwaves are not especially good for defrosting foods, but neither is the hob. The trouble with the microwave is that it works much better with water than with ice and this leads to uneven melting. For something like sausages, the bits that get defrosted first rapidly start to get hot and cook while other parts are still frozen. This is why microwaves have an on/off defrost cycle; the rests between heating are supposed to allow time for temperatures to even out. You can't defrost sausages on a hob at all but you can melt, for example, frozen blocks of stock. The trouble there is that the ice makes bad contact with the bottom of the pan and the first few tablespoons of melt can easily boil away if you aren't careful. Once you have a good pool of liquid the saucepan method is quite efficient, however. The DEFRA study didn't try using a hob for defrosting, though it did find that the microwave was much more efficient than an oven for heating frozen ready meals or cooking frozen pizza. The most energy efficient way to defrost things is to put them in the fridge. It takes longer but it saves energy because the food defrosting sucks heat out of the fridge and helps to keep it cool. Obviously this does require forward planning. You can defrost things more quickly without using heating either by submerging the item in a bowl of water (assuming the food container is watertight) or by sitting them on an aluminium baking tray. In both cases the key is to conduct heat into the food as fast as possible. Heating up liquids Suppose you want to reheat some baked beans or some soup. The microwave is very good at this because the food contains a lot of water and  absorbs the microwave energy very well. The hob approach suffers because you need to warm up the saucepan as well as the food. However, in my experiments (reported in my book) with boiling potatoes the saucepan only used 15% of the energy. The DEFRA study found that when heating up a single portion of baked beans the electric hob (the ordinary type, not an induction hob) used about the same energy as the microwave and for two portions (so the saucepan heat capacity is proportionately less)  the hob used a third less energy than the microwave. The microwave was not as efficient as it could have been because it heated the beans too much.  When you are using a saucepan it is much easier to stop as soon as the food is warm enough. Cooking porridge is a combination of heating the liquid and cooking the oats. Initially the oats contain very little water and they warm up quite slowly in comparison to the liquid which tends to froth over. The DEFRA study found that cooking porridge in a saucepan was more energy efficient than the microwave except for small quantities. Heating up solids Suppose you want to reheat some rice. You can do this on a hob by steaming but that involves heating up quite a lot of water and turning it to steam which takes a lot of energy. The microwave heats the rice very well because there is sufficient water in the rice to absorb the microwave energy effectively. Cooking vegetables The DEFRA study found that boiling new potatoes in a saucepan took 3-4 times as much energy as cooking in the microwave and the numbers were similar for cooking frozen vegetables and for cooking salmon fillet (compared to poaching in a saucepan). In all these cases the microwave wins because you only have to add a little bit of water whereas when cooking in a saucepan you have to use enough to cover the food. In my cooking experiments 40% of the energy went into water and another 19% into steam (even though I did keep the lid on). However, to cook in a microwave your vegetables do have to be in small pieces. Since we have a gas hob I shall continue to use the microwave for reheating small amounts of food and the saucepan for most other things. For vegetables the 3-4 times energy hit is more or less offset by the higher carbon emissions of the electricity. If I had an electric hob, even an induction hob, then I would be thinking now about how to make better use of the microwave. (1) My microwave takes 1200 W to generate 800W. Wikipedia reckons a typical microwave is 64% efficient. Newer ones may be better than this. (2) Electric ovens are around 12% efficient and gas ovens half that, according to a study by Lawrence Berkeley National Laboratory for the US DOE. This dates from 1996 and could be out of date. However, the numbers are broadly consistent with my cooking experiments which I report in my book. (3) BNCK07: Comparing energy use in microwave ovens with traditional electric fuelled methods (2006) DEFRA. 1. What about using a pressure cooker? 1. I haven't got one - do you? What do you use it for? How much time does it save? 2. I've used a pressure cooker for over 30 years. It scores highly on cooking anything which has a long boiling/simmering/steaming time by other means, eg beans or rice, cooked from dry; soups and stews. Those take about a third of the usual time on the hob. Rice can be cooked in exactly the amount of water it needs, on a trivet over extra water to provide the steam - and ends up perfect. But don't use it for anything for which you need an exact cooking time, because you can't open the cooker immediately after the planned cooking time - it has to depressurise first. Anything whose surface will suffer if it gets wet requires lots of extra care because of the steamy atmosphere inside the cooker. So it's good for soup etc, which is good with a little extra heating time, but would be disastrous for a souffle. 2. This comment has been removed by a blog administrator. 3. The carbon emissions comparison is only viable if none of your electricity comes from renewables, like wind, or solar - also - everyone seems to ignore the fact that gas is a finite resource - once it's gone, it's gone. 4. This comment has been removed by a blog administrator. 5. This comment has been removed by a blog administrator. 6. This comment has been removed by a blog administrator. 7. This comment has been removed by a blog administrator. 8. This comment has been removed by a blog administrator. 9. This comment has been removed by a blog administrator. 10. This comment has been removed by a blog administrator.
global_05_local_5_shard_00002591_processed.jsonl/32297
All that hype about organic skincare —Is it worth it? There is an increasing hype now around organic food. People started to be a little more conscious about what they put into their bodies, but they are still overlooking what they are putting on their skin.   Just because you don’t eat it, it doesn’t mean that it’s not harmful. Everything that we apply on our face and bodies in form of creams, serums, lotions, is absorbed through the skin. The toxic ingredients that some of those products may have, travel through the skin in our bloodstream and can cause cancer.  The good news is that nowadays, a lot of brands are conscious about this and we see more and more labels on the market indicating “paraban-free”, “aluminum-free”, “cruelty-free”, “non-toxic”, “organic”, etc. Here is why all that hype about organic skincare is worth it: 1. Organic products are made of plants and other natural ingredients. When we say “organic cream”, it means its ingredients are grown For example, at EpicOrganic we use only natural ingredients like aloe vera, algae, green tea extract, plant oils like grape seed, hemp, grapefruit, tea tree. 2. Non-organic skincare products contain harmful ingredients Just to elaborate more on the ingredients, most mainstream cosmetics go through heavy production processes and they contain a lot of toxic chemicals. Just to name a few: lead, parabens, formaldehyde, fragrance, nitrosamines. Your skin absorbs all of this nasty stuff. We cannot see the harm directly. But, often this manifests via chronic headaches, breathing disabilities, hormone disruption, and even cancer. So think twice before you buy that cream that promises to do wonders for your skin. 3. Organic doesn’t mean expensive Now you don’t have any excuse not to use organic products. There is a general misconception that organic means automatically more expensive. Well not at all! Just take a look at our prices. They are way more affordable than other non-organic brands out there. All you need to do is a little research when you buy your products. 4. Organic skincare products work better for your skin Your skin has a natural flora composed of bacterial species that help to keep your skin healthy. Non-organic products can kill this microbiome, and alter your natural skin’s PH. Organic products, on the other hand, are made of natural plants that contain a higher level of vitamins and antioxidants. This way your skin can receive all the good minerals and nutrients, while your microbiome is protected. 5. Cruelty-free Another bonus of using organic brands is that they are cruelty-free. Organic products don’t have to be tested on animals, because they are safe and harmless. So next time you buy non-organic, think about that cute little rabbit that has been tortured. 6. You’re helping to protect the environment. By going organic, you’re also indirectly, contributing to the preservation of our environment. Because organic products use naturally grown ingredients that are free from toxic pesticides and fertilizers, they don’t leave a harmful footprint on the planet, particularly the soil, water, and air. So you kill two birds with one stone—you do well for your skin and our Mother Earth.
global_05_local_5_shard_00002591_processed.jsonl/32303
1. Glad you found it so, Val. Balance is something we all need though we don’t always perceive or receive. Cheers, Eric P/s Nice article on the state of American politics. I did not comment as I don’t know enough about local politics. I get the impression that politicians everywhere are from the same mould — 1. More great words to think about, Eric, and how many of us take this gift for granted? How often do we have “selected seeing?” Your haiku are awesome, my friend! Sending many hugs your way! xx 1. Both pertinent questions, Lauren. When a friend gives us a gift which we toss aside – what would we say when he asks – “Did you like my gift?” To add a religious (not neccessarily of any particular faith) slant: He has given us this Gift and when we finally meet Him, what would we say when He asks – “I waited long for you. How did you get lost, did my Gift not work?” Thank you for your visit and lovely comment. Luv and hugz, Eric 🙂 1. Wow, I love your example, too, especially, the religion question, Eric…it really makes one stop and think…there are so many different angles! xxx 🙂 1. Thank you Jen, In the short time you have been in Blogsville, you’ve touched many with your shining light. This award is befitting. Congratulations 🙂 Thank you also for nominating me for the Shine award. Much appreciate this. All good wishes with your blogging, 2. What a perception of mind Eric! It does see only what our mind wants and conveys! Closed eyes know, They penetrated to the core Realize the hidden pain. 1. It’s alright. I’m wondering whether your poetry applies to the painters? Normally, painters will use their sights to observe and paints. 🙂 2. Oh okay – now it is clear Yoshiko 🙂 Many talented painters have great insights – like Michelangelo. Others paint images which not many can “see” – but with layered depths. Years later, their talent is uncovered. I suppose painters are like all artists – writers, scupltors, carvers, poets – there are many “sighted” and many “blinded”. The majority, like most of us, are struggling for true sight and manage glimpses. All good wishes dear, Eric 🙂 1. Hmmm, now that you mentioned it, David – yes, one is passive and the other active. Interesting, as writers we always use active words but I never did transpose that to sight. Maybe because I’m naturally “inactive” 🙂 Good to have you back. I see you loaded another post – be there soon, P/s Are you going to release another episode of Fantastic Travelogue – I am almost demanding it 🙂 – okay, asking politely, please. 3. Okay, so yesterday’s hint on jail was today’s “cell”. Clever indeed. That we should remove the veil from our eyes, use a bigger screen to view further, deeper and wider. We can learn even from the smallest ant if we care to see and comprehend. Thanks for this wise thought. 1. Insightful Jasey, All Life brims with lessons – and no ant is any less. But where are the students — what distractions keep them away — what currency pays for that truancy Peace dear, 4. Sorry you don’t welcome quotes. There’s a piece of lyric from a song by John Lennon that is particularly apropos this Haiku. I’ll simply state it without quotes. There’s nothing you can see that isn’t shown. 1. You’re right Richard, I don’t welcome quotes because, for me, you are more important and I want to hear your voice and your thoughts. Yes, John Lennon was a gifted artist who touched many of us. Many of his songs carried obvious hints that spoke to seekers. Peace, Eric 1. Yes, it may be common knowledge to most, Cat – but not to all, I reckon. There are still some who demand – “Prove it” – when, perhaps it is they who need to “see it”. You’re right, the mind’s eye is a great place to start. Peace, Eric I like to hear your thoughts error: Content is protected !! %d bloggers like this:
global_05_local_5_shard_00002591_processed.jsonl/32305
Het Geheim Revision as of 05:25, 23 February 2017 by Satj (talk | contribs) Jump to navigation Jump to search Het Geheim ("The Secret") is a Dutch title that appears to have been given to many plays, of which a number have been performed in South Africa. They are often translations from the French or the German (possibly even English, see The Secret by Morris) and there is some confusion in some cases about which exact text is being used, for the works seem to be somewhat interwoven. The plays Het Geheim by Hoffman and Solié (tr. Geysbeek) A one act Dutch version of Le Secret, a French one-act opéra by François Benoît Hoffman (1760–1828) and Jean-Pierre Solié (1755- 1812). See Le Secret Het Geheim by Christian August Vulpius (tr. Anon.) A Dutch translation of Das Geheimnis, a German play in 5 acts by Christian August Vulpius (1762 – 1827). See Das Geheimnis Het Geheim by Fournier and Arnould (Tr. A.H. de Bruine) A Dutch version of Un Secret, a French drama in three acts by Narcisse Fournier and Auguste Jean François Arnould. See Un Secret Return to Return to PLAYS I: Original SA plays Return to PLAYS II: Foreign plays Return to PLAYS III: Collections Return to PLAYS IV: Pageants and public performances Return to South African Festivals and Competitions Return to The ESAT Entries Return to Main Page
global_05_local_5_shard_00002591_processed.jsonl/32308
decision making using system modeling 2   Chapter 5 discusses conclusion making using plan exampleing. The fabricator briefly mentions an public cause software utensil, EMA Workbench, that can entire EMA and ESDMA exampleing. Find EMA Workbench online and go to their ocean website (not the GitHub download site). Then do the following: 1) Under documentation, go to the Tutorials page. 2) Read through the Sincere Example (in your selected environment), and the Mexican Flu example.  3) Decide how you could use this software to compose a example to aid in developing a device for a Smart City.  To entire this assignment, you must do the following: A) Compose a new tenor. As implied aloft, interpret how you could use the EMA Workbench software to develop a example to aid compose a device for a Smart City. Interpret what device you are unamenable to compose (i.e. commerce thoughtless arrival, surveillance camera coverage, taxi licenses issued, etc.), and what key features you would use in your example. Then, interpret how EMA Workbench would aid you. NOTE: conduct your examples and features sincere. You don't truly demand past than 2 or 3 features to establish your aim short.
global_05_local_5_shard_00002591_processed.jsonl/32313
We would like to get all public keys, account and balances for a particular ERC20 contract. We understand we will need to scan the entire ethereum blockchain to do this. We also understand that a public key is not visible unless the owner has made one transaction with it. We have created a geth node which is fully synced. When we hit this node withe following RPC call (for the genesis block), it returns no transactions: {"jsonrpc":"2.0","method":"eth_getBlockByNumber","params":["0x0", false],"id":1} "jsonrpc": "2.0", "id": 1, "difficulty": "0x400000000", "extraData": "0x11bbe8db4e347b4e8c937c1c8370e4b5ed33adb3db69cbdb7a38e1e50b1b82fa", "gasLimit": "0x1388", "gasUsed": "0x0", "hash": "0xd4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3", "logsBloom": "0x00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", "miner": "0x0000000000000000000000000000000000000000", "mixHash": "0x0000000000000000000000000000000000000000000000000000000000000000", "nonce": "0x0000000000000042", "number": "0x0", "parentHash": "0x0000000000000000000000000000000000000000000000000000000000000000", "receiptsRoot": "0x56e81f171bcc55a6ff8345e692c0f86e5b48e01b996cadc001622fb5e363b421", "sha3Uncles": "0x1dcc4de8dec75d7aab85b567b6ccd41ad312451b948a7413f0a142fd40d49347", "size": "0x21c", "stateRoot": "0xd7f8974fb5ac78d9ac099b9ad5018bedc2ce0a72dad1827a1709da30580f0544", "timestamp": "0x0", "totalDifficulty": "0x400000000", "transactionsRoot": "0x56e81f171bcc55a6ff8345e692c0f86e5b48e01b996cadc001622fb5e363b421", Transactions is empty. But when we scan block 0 thusly: https://etherscan.io/block/0 we get many transactions back: Block Information Height: 0 TimeStamp: 1056 days 22 hrs ago (Jul-30-2015 03:26:13 PM +UTC) Transactions: 8893 transactions and 0 contract internal transactions in this block Hash: 0xd4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3 If etherscan is "faking" these 8893 transactions, where is it pulling them from? No, your node is returning the right list of transactions for the Ethereum genesis block. You can't have actual transactions in the genesis block. By definition, a transaction has to be brought into existence either by being called by an externally owned account, or another contract; but since there's 'nothing' only until genesis block comes into existence, you can't have any transactions in the genesis block (number 0). Your second question is how does etherscan has it, and my guess is that it has something to do with genesis_block.json file. You can define this file to contain things or pseudo-transactions (or a useful case would be to capture the state of a previous blockchain) in your genesis block. With regard to the genesis_block.json file, you can read more here. But having a different genesis_block.json and being able to sync with the network is still very surprising to me. Needless to mention, I have two local nodes (geth and Parity) and as expected, they also return empty transaction list for block 0, and so does this explorer. | improve this answer | | Your Answer
global_05_local_5_shard_00002591_processed.jsonl/32333
We are the "Faculty for Exploration" Our Faculty is a high performer in both research and teaching, and home to 28 professorships and six tenure-track professorships. The scientists of the Faculty are grouped around four key research areas: “Cosmos”, “Earth”, “Environment”, and “Anthroposphere”. Students receive a thorough and hands-on education guided by committed staff. The Faculty offers a multitude of exciting assignments in research, teaching, and administration. The Faculty is committed to increase the number of women in scientific positions. The Faculty consists of the following subunits:
global_05_local_5_shard_00002591_processed.jsonl/32335
Game of Thrones TV TV Recaps ‘Game Of Thrones’: Wait, Did They Just Kill Off [Spoiler]!?!?!? In case you’re new around here, I’ll give a quick little warning. Okay, so on behalf of everyone who just watched the fourth episode of the seventh season of Game of Thrones, can I just say something? I’m going to try to keep my emotions somewhat under wrap during this post, and give you all a recap of what just happened. But no promises. I’m seriously not okay. So tonight, Game of Thrones premiered the fourth episode of Season 7. And while a lot went down, I’m only going to be talking about one thing in this particular post. The highly anticipated battle between the Lannister and Targaryen army. That’s right. Tonight we witnessed the Kingslayer lay his eyes upon a dragon. I don’t know about you, but I had a lot of emotions. Initially, excitement coursed through my veins. Cersei is beginning to think she’s untouchable, and I couldn’t wait for Dany to prove her wrong. But then I remembered two characters that fight for the Lannister army. Two characters that I happen to love. When I was faced with the idea that Daenerys may be the one to kill Jaime and Bronn, my heart stopped. It Isn’t As Simple As Good Vs. Evil One of the things that makes Game of Thrones so appealing to audiences is the fact that there is good and bad in each person. So, yes, you can say that you want the Lannister or Targaryen army defeated. But you may not want to see every person on that side suffer. I’m a Daenerys fan, and there isn’t a cell in my body that doesn’t want to see her on the Iron Throne. But I have a deep love for both Jaime and Bronn. I wouldn’t want to see them hurt, or Gods forbid, killed by the rightful Queen of the Seven Kingdoms. But that may be what we just witnessed. Bronn, after realizing that Jaime can’t possibly shoot with one hand, rushes over to Qyburn’s device, which, if you remember, basically works like this: [Credit: The Hobbit] He misses the first shot. But the second? Dead on. The arrow hit Drogon right between the chest and the wing. He began to fall from the sky, but quickly recovered. The wound may not be as fatal as we originally thought. What a relief, right? Daenerys lands safely and tries to tend to Drogon’s wounds. Bronn was able to escape death by dragonfire. Things are looking surprisingly okay all things considered. But Jaime never did know when to quit. He saw his opportunity. And he took it. “You Fucking Idiot.” At this moment, I think the entire audience was Tyrion. Watching his brother from afar, he murmurs, “You fucking idiot”. We watch as Jaime takes a spear in hand and begins to charge at Daenerys. To his credit, he almost makes it. There was a brief flash where I was genuinely concerned. But Drogon would never let anyone hurt his mother. He quickly turns to the Kingslayer and his massive jaws slacken. We see fire growing hot in his throat, and just as we are certain of Jaime’s imminent death, Bronn comes charging out of nowhere. He knocks Jaime into the water, and they both narrowly avoid the dragonfire. But not entirely unscathed. Both men, particularly Jaime, are wearing heavy armor. Not to mention that Jaime has a solid gold hand. No news on if the fire managed to burn either of them, but one thing is certain. Even if fire did not kill them, water very well might. The episode ended in true Thrones style, reminding us of the painful cliffhangers they so desperately love. We watch Jaime struggle as he drowns, slowly floating to the bottom of the sea. The shot fades out, and we cut to credits. As much as this scarred me (and it did), I’m not just here to freak out, and I’m not just here to recap. I’m here to drop some knowledge. What is the likelihood that we just witnessed Jaime Lannister’s death? To be frank, I’m feeling pretty optimistic. I think it was a close call. Things may not be looking good, but let’s be real here. Thrones likes to shock its viewers, but it also likes to torment them. When there is a character that is deeply loved or hated (and Jaime happens to be both), they don’t kill them off subtly. They do it loud. They make a show of it. They make us feel emotions we never thought we were capable of. Jaime fading into the murky waters? It’s dramatic, sure, but could be much more emotional. How Will Jaime Survive? There are a couple of ways that Jaime could survive this. One, Bronn also survives the near death experience. Being a much more skilled warrior, I have no doubt he’s gotten himself out of equally challenging situations. I have a feeling he could handle himself in water, and would have the sense to tear Jaime’s armor and golden hand off. He would, with great effort, be able to drag Jaime to shore. How long they would survive after that…well, that’s another story. But there is another option. Tyrion watched this all happen. Though he is loyal to Daenerys, Jaime is his brother, and he’s saved his life multiple times. He holds no love for Cersei, but great love for Jaime. He could convince Daenerys to save him, let him live for the time being. The reasoning? Jaime is the head of the Lannister army and brother/lover to one of her greatest enemies. He is the perfect captive. Did Jaime Lannister die tonight? Call me naive, but I don’t think we’ve seen the last of him. But we won’t know for sure until next week…. Until then, feel free to geek out with me in the comments! Do you think Jaime will survive this? Let me know! Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_05_local_5_shard_00002591_processed.jsonl/32355
Jump to content • entries • comments • views FileMaker DevCon To Convene Against Backdrop Of Cyber-Attacks Across The Globe Steven H. Blackwell FileMaker DevCon To Convene Against Backdrop Of Cyber-Attacks Across The Globe July 18th 2017 In just a few days, four generations of FileMaker developers and users from all over the world will gather for the 22nd Annual FileMaker DevCon, held this year in Phoenix, Arizona. We will do so against an unprecedented backdrop of critical security issues facing businesses and organizations all over the world.  Organizations of all sizes and from every business sector are vulnerable.  Small to medium-sized businesses are particularly so, especially in the areas of financial services, health care services, and retail services. Jeff John Roberts and Adam Lashinsky, the latter well-known as a chronicler of FileMaker, Inc.’s parent company, reported recently: …business is under assault like never before from hackers, and the cost and severity of the problem is escalating almost daily. (Cybersecurity: How Business Is Protecting Itself Bob Pisani, well-known business reporter for CNBC, also recently reported on a major cyber-attack: …snack food and beverage giant Mondelez International became the latest victim of a cyber attack. The company said it was hit with an attack on June 27 that compromised its ability to ship and send invoices during the last four days of its second quarter. What made this call unusual is that the company quantified exactly how much the attack hurt them: Its preliminary estimate of the impact indicates a 3 percent slice off its revenue growth rate for the quarter. (Cybersecurity stocks rally as global hackings start to impact corporate bottom lines Additionally, in May of 2018 developers and their client organizations on both sides of the Atlantic will become subject to the comprehensive General Data Protection Regulation (GDPR) promulgated by the European Union (EU). Organizations that store data about EU citizens are bound by the GDPR strictures, irrespective of where the organization itself resides.  It will remain to be seen how the EU is able to enforce those requirements outside its own boundaries. These issues, of course, also apply to platforms other than FileMaker. But as the developers, administrators, custodians, and users of business systems based on the FileMaker Platform, our principal concerns must be the identification and management of these issues. These are not principally technical or programming issues.  They are—first and foremost—business issues:  business criminal and civil liability, business continuity, and business reputation among them. ·      Organizations of every type face criminal and civil liability sanctions if a data breach occurs. ·      Some attacks and breaches can literally speaking put an organization out of business, rendering it unable to continue functioning and to provide its designated services. ·      Even if an organization is able to recoup and to continue, its reputation will be damaged and its brand diminished. As FileMaker developers we all have a responsibility to our clients to design our business solutions and to deploy and operate them with these security constraints in mind.  As in-house developers and administrators, we likewise have the responsibility to our customers, our shareholders, our members, and our fellow employees to operate our database systems in a responsible and careful fashion. What are some of the more significant and damaging exploits that some Threat Agent could employ against FileMaker Platform business management solutions?  And who are those Threat Agents? Threat Agents include a variety of actors, some malevolent, some hapless, some innocent: ·      Malicious Outsiders seeking financial gain or seeking to disrupt the organization’s business processes. ·      Malicious Insiders, current or former employees, or parts of an organization’s supply chain. ·      Inept Insiders who accidentally or unknowingly cause security-related incidents that damage, delete, or otherwise alter critical organizational data. ·      Threads in the Supply Chain where carelessness or poor security practices facilitate damage to our own organizational data and functioning. ·      Finally, although this by no means is a complete list, inattentive or unknowing developers, administrators, or custodians of FileMaker Platform business management solutions who do not follow Best Practices for Security and management of those systems. What type of exploits can Threat Agents employ that damage these solutions and thereby damage the organization as well? ·      Deleting of data, intentional or accidental. ·      Altering of data, either obvious or (more problematically) subtle in nature. ·      Extracting of data for competitive business purposes or for use for embarrassing or damaging the organization. ·      Adding of spurious data. ·      Manipulating of tracking processes for key business activities such as invoice or accounts payable processes. What can FileMaker Platform developers and administrators do to protect against these exploits, to lessen vulnerabilities, and to reduce risks of their occurring?  Security Check Lists are almost always bad ideas, because they overlook the dynamic and on-going nature of vulnerabilities, threats, and risks.  Nevertheless, here are a few items to consider: ·      Use FileMaker Server and invoke Encryption in Transit for data flowing across networks. ·      Employ Encryption at Rest on the database files.  One of the most frequently used attack vectors is getting a copy of the files and performing attacks on them. ·      Use File Access Protection on all files in the business management solution to prevent unauthorized access to fields, tables, scripts, value lists, and similar schema elements. ·      Use finely-grained Privilege Sets.  Respect the Rule of Least Privileges that states “Users should have all the privileges necessary successfully to fulfill their roles, but no more and no higher privileges.”  Escalation of privileges is a major vulnerability. ·      Employ strong credentials to access the FileMaker business management solution.  Use the tools that FileMaker, Inc. provides.  Do not try to invent your own system for doing this. Those artificial or ersatz security systems are rife with vulnerabilities.  This is particularly true of those that first grant access to the file, even at a diminished level of Privileges, and then require the user to take some actions or go through some process before using the system. ·      Remember that the User Interface is not part of the Security Schema.  Just because you cannot see or change something via the UI does not mean that an Attacker cannot see it, alter it, or delete it. I will hope to see many of you at the Developer Conference.  And I would be happy to discuss any of these items with you in greater detail. Steven H. Blackwell Recommended Comments There are no comments to display. • Create New... Important Information
global_05_local_5_shard_00002591_processed.jsonl/32366
Important: Please read the Qt Code of Conduct - [Solved]Dynamic cast to void pointer • Hi, I am using LiteCAD activex in my application. I am calling its methods as follows, // Generate drawing bool isDraw = axControl->dynamicCall("DrwNew()").toBool(); // Get default block from drawing hBlock = axControl->dynamicCall("DrwGetFirstObject(int)", QVariant(5)).value<void *>(); // Convert hBlock to QVariant QVariant temp = qVariantFromValue((void *) hBlock); //add line axControl->dynamicCall("BlockAddLine( HANDLE, 0,0, 50,50 )", hBlock); //draw all objects axControl->dynamicCall("DrwRegenViews(HANDLE)", hBlock); hBlock is defined as HANDLE (HANDLE is like a void *). I am getting hBlock from "DrwGetFirstObject(int)" this method, and i want to pass it to another method. Now the problem is after executing this there is zero in hBlock. If i omit value<void *> then i get some int number in QVariant. That means there is something wrong in type casting, but i don't know what ? Then i tried passing qVariant as it is to next function. But there i got error from activex as "Non-optional parameter missing", where as i am passing all parameters. I am doing some basic mistake, but can't able to figure it out please help... • Hi ashokb You have problem in casting or in dynamicCall? • Moderators From the looks of it you are passing a "5" as a void* into dynamicCall. I can't think of any reason why you would want to do that. There is going to be nothing useful at memory address 0x00000005. Also, when you do QVariant(5) it is going to be set as an int and not cast into a void* as QVariant "knows" better. So that is why when you remove the void* it gives you an int value. I would give you an answer to help you but I don't really understand what the code is supposed to do. What are you trying to do with that QVariant? What is dynamicCall()? Why is dynamicCall modifying hBlock? That seems like something that would cause problems in Windows. Especially if someone didn't free the handle resources. • Hi a.jafarabadi i have problem with casting. Hi ambershark I am NOT PASSING 5 as void *. // Get default block from drawing In above code actually i am passing 5 as parameter to "DrwGetFirstObject(int)" function which should be a QVariant, and then function suppose to return me a HANDLE (ie void *) of hBlock. It returns me QVariant(int, 419171632) if i qdebug return value as it is. I want to store that value as a void * in hBlock hence i am using QVariant.value<void *>() method to cast into void *. The problem is, after executing this line data in hBlock is 0x0 which is not expected.(expected is something like 0x419171632). Let me know if still not clear and thanks for replay.... • For the sake of clarity, try separating the call to QAxBase::dynamicCall() from the call to QVariant::value(). Then verify that the QVariant is valid, at least for development purposes. Finally, cast it to a void pointer, and inspect it again. QAxBase::dynamicCall() is documented as returning an invalid QVariant if the call fails, or if the called method doesn't return a value. Maybe something is going wrong prior to the cast. • Hi jeremy_k I have verified that QVariant is valid. qDebug prints this, QVariant(int, 419171632). that means dynamic call is working, there is issue with casting. So, i have a QVariant and i want to convert it to void *. I am doing HANDLE hBlock = QVariant.value<void *>; where QVariant is QVariant(int, 419171632) i get 0x0 in hBlock. • Try a reinterpret_cast<void *> @#include <cstdio> #include <QVariant> int main(int argc, char *argv[]) QVariant var(0x12345678); void * ptr1 = var.value<void *>(); void * ptr2 = reinterpret_cast<void *>(var.value<int>()); printf("%p %p\n", ptr1, ptr2); return 0; • Hi That works !!! value<void *>() still returns zero. qDebug Output: hBlock:QVariant(int, 418057520) ptr1: 0x0 ptr2: 0x18eb0d30 • Moderators Sorry about the 5 thing, I missed a parenthesis when I was reading the code. :) Glad the reinterpret_cast worked for you though. • Hi, ambershark You should not sorry for that , actually i should sorry for posting some unreadable code. 1. reinterpret_cast worked for me, but yesterday i was reading about it and found that its dangerous to use. 2. If using QVariant.value<>() is a correct way to convert QVariant to any other type then why it is not working in my case? 3. On many forums its recommended not to use reinterpret_cast, then what might be the other way in this case(QVariant to void *)? • reinterpret_cast tells the compiler "trust me, I know what I'm doing". There is no other options (that I know of) for transforming to or from void *. Nothing inherits from void *, and it doesn't inherit from anything. There is no inherently meaningful way to convert it to a pointer to a valid object without risking converting it into a pointer to an invalid object. Because of it's lack of meaning, arithmetic and dereferencing void * are also meaningless. So no, if you don't understand what it is or how it can be used, staying away from both reinterpret_cast and void * is a good idea. The same caveat goes for C-style casting. • I was slightly hasty dismissing static_cast<void *>. That works from a pointer to void *, and back again. More detail: • Hi jeremy_k Thanks for useful info and help.... • Moderators I agree with what jeremy_k said. I use reinterpret_cast a bit in code. It can be dangerous because it has no type checking. When dealing with void *s though there is rarely any type checking and using reinterpret_cast is just fine. Like jeremy said it is basically telling the compiler you know what is in that data and want it cast to a certain type. The "dangerous" part comes in if you are not paying attention as a programmer. If you know for sure your pointer is a valid one of class X then a reinterpret_cast is just fine. If you think of it in C style it is the same as saying: void myVoid = (void)new MyClass; MyClass *c = (MyClass *)myVoid; Both of those above examples are the same as reinterpret_cast's in c++. In fact you can use the C style casting method in C++ just fine. • Hi Got it... Thanks to both of you. Log in to reply
global_05_local_5_shard_00002591_processed.jsonl/32392
Tag: mysql Replication from External Primary/Leader into GCP Replication from External Primary/Leader into GCP This is a post based on recent tutorials I published, with the goal of discussing how to prepare your current MySQL instance to be configured as an External Primary Server with a Replica/Follower into Google Cloud Platform. First, I want to talk about the jargon used here. I will be using primary to represent the external “master” server, and replica to represent the “slave” server. Personally, I prefer the terms leader/follower but primary/replica currently seems to be more common in the industry. At some point, the word slave will be used, but because it is the keyword embedded on the server to represent a replica. The steps given will be in the context of a VM running a one-click install of WordPress acquired through the Google Marketplace (formerly known as Launcher) . To help prepare for replication you need to configure your primary to meet some requirements. 1. server-id must be configured; it needs to have binary logging enabled; it needs to have GTID enabled, and GTID must be enforced. Tutorial. 2. A Replication User must exist on the primary, remembering you may need root to create it 3. A dump file must be generated using the mysqldump command with some information on it. The steps above are also necessary if you are migrating from another cloud or on-prem. Why split the application and database and use a service like Cloud SQL? Cloud SQL Cloud SQL First, you will be able to use your application server to do what it was mainly designed for: serve requests of your WordPress application (and it doesn’t much matter for the purposes of this post if you are using nginx or Apache). Databases are heavy, their deadly sin is gluttony, they tend to occupy as much memory as they can to make lookups fairly fast. Once you are faced with this reality, sharing resources with your application is not a good idea. Next, you may say: I could use Kubernetes! Yes, you could, but just because you can do something doesn’t mean you should. Configuring stateful applications inside Kubernetes is a challenge, and the fact that pods can be killed at any moment may pose a threat to your data consistency if it happens mid transaction. There are solutions on the market that use MySQL on top of Kubernetes, but that would be a totally different discussion. You also don’t need to use Cloud SQL, you can set up your database replicas, or even the primary, on another VM (still wins when compared with putting the database and application together), but in this scenario you are perpetually risking hitting the limits of your finite hardware capabilities. Finally, Cloud SQL has a 99.95% availability and it is curated by the SRE team of Google. That means you can focus your efforts on what really matters — developing your application — and not spend hours, or even days, setting up servers. Other persuasively convenient features include PITR (Point in Time Recovery) and High Availability in case a failover is necessary. Setting up the replica on GCP Accessing the menu SQL in your Google Cloud Console will give you a listing of your current Cloud SQL instances. From there execute the following: 1. Click on the Migrate Data button 2. Once you have familiarized yourself with the steps shown on the screen, click on Begin Migration 3. In the Data source details , fill the form out as follows: 1. Name of data source: Any valid name for a Cloud SQL instance that will represent the primary server name 2. Public IP address of source: The IP address of the primary 3. Port number of source: The port number for the primary, usually 3306 4. MySQL replication username: The username associated with the replication permissions on the primary 5. MySQL replication password: The password for the replication username 6. Database version: Choose between MySQL 5.6 and MySQL 5.7. If you are not sure which version you are running, execute SELECT @@version; in your primary server and you will have the answer. 7. (Optional) Enable SSL/TLS certification: Upload or enter the Source CA Certificate 4. Click on Next The next section Cloud SQL read replica creation, will allow you to choose: 1. Read replica instance ID: Any valid name for a Cloud SQL instance that will represent the replica server name 2. Location: choose the Region and then the Zone for which your instance will be provisioned. 3. Machine Type: Choose a Machine Type for your replica; This can be modified later! In some cases it is recommended to choose a higher instance configuration than what you will keep after replication synchronization finishes 4. Storage type: Choice between SSD and HDD. For higher performance choose SSD 5. Storage capacity: It can be from 10GB up to 10TB. The checkbox for Enable automatic storage increases means whenever you’re near capacity, space will be incrementally increased. All increases are permanent 6. SQL Dump File: Dump generated containing binary logging position and GTID information. 7. (Optional) More options can be configured by clicking on Show advanced options like Authorized networks, Database flags, and Labels. 8. Once you’ve filled out this information, click on Create. The following section, Data synchronization, will display the previous selected options as well the Outgoing IP Address which must be added to your current proxy, firewall, white-list to be able to connect and fetch replication data. Once you are sure your primary can be accessed using the specified credentials, and the IP was white-listed, you can click on Next. After that replication will start. Live demo If you want to see this feature in action, please check this video from Google Cloud Next 2018: Generating a mysqldump to import into Google Cloud SQL According to the documentation, you will need to run: [code lang=bash] mysqldump \ –databases [DBS] \ –hex-blob –skip-triggers –master-data=1 \ –order-by-primary –compact –no-autocommit \ –default-character-set=utf8 –ignore-table [VIEW] \ –single-transaction –set-gtid-purged=on | gzip | \ gsutil cp – gs://[BUCKET]/[PATH_TO_DUMP] The mysqldump parameters are: • -u takes the username passed on [USERNAME] • -p informs that a password will be given Configuring GTID and binary logging Configuring GTID and binary logging [code lang=bash] Enabling GTID [code lang=bash] gtid_mode = ON enforce-gtid-consistency = true Side effects If you do the following: [code lang=sql] [code lang=text]
global_05_local_5_shard_00002591_processed.jsonl/32400
Squilliam said: So long as it is many times more powerful than the PS3 it doesn't matter if it is moderately powerful. Well, I hope you're right, but I don't see that being the case if third party development for PS4 is like Wii's was last gen and 720's is exclusively like 360 and PS3.
global_05_local_5_shard_00002591_processed.jsonl/32407
You searched for: Creator Guernsey, E. Y., cartographer. Remove constraint Creator: Guernsey, E. Y., cartographer. Public/Restricted Public Remove constraint Public/Restricted: Public Type Image Remove constraint Type: Image Contributor Indiana Remove constraint Contributor: Indiana Place Indiana Remove constraint Place: Indiana Search Results No results found for your search Try modifying your search
global_05_local_5_shard_00002591_processed.jsonl/32408
Australian special forces allegedly EXECUTED hog-tied Afghan prisoner because there was no space for him in helicopter Australian special forces have been accused of killing an unarmed, bound prisoner in cold blood, as a four-year probe into alleged war crimes committed by Aussie troops in Afghanistan nears its end. A US Marine helicopter crew chief told the Australian Broadcasting Corporation (ABC) that a group of Australian soldiers shot and killed an Afghan prisoner as they were preparing to be airlifted after a raid.  According to the marine, identified only as Josh, the Aussie commandos radioed his helicopter to tell them they needed transportation for seven prisoners captured during the operation.  “And you just heard this silence, and then we heard a pop. And then they said, ‘OK, we have six prisoners’,” Josh told the Australian outlet.  The US marine said it was the first time he had seen something he couldn’t “morally justify,” as the prisoner had already been detained and posed no threat to the Aussie forces.  We knew somebody was already cuffed up, ready to go, taken prisoner, and we just witnessed them kill a prisoner. He said he spoke about the incident with the rest of his crew and the team agreed there was “no excuse” for what happened. “It was a very deliberate decision to break the rules of war,” he claimed. A spokesperson for the Australian Defence Force told ABC it could not comment on the report because it may be the subject of an ongoing inquiry into alleged misconduct by Australia’s Special Operations Task Group in Afghanistan between 2005 and 2016. The secretive inquiry began more than four years ago. A report outlining the probe’s findings is expected to be released by the end of the year.  ABC has reported numerous alleged crimes committed by Australian forces in Afghanistan, after the outlet obtained military documents that detailed the killing of unarmed civilians, including children.  The Australian Federal Police carried out a highly controversial raid of ABC’s Sydney headquarters, reportedly in an effort to confiscate the explosive leaked documents. In June, a federal prosecutor recommended that charges be brought against an ABC journalist who reported on the leaks, but the government is still deciding whether to take the reporter to court.
global_05_local_5_shard_00002591_processed.jsonl/32415
GIJC15 has ended Back To Schedule Friday, October 9 • 14:30 - 15:30 Data Track: Are the Rumors True? Learn How To Check Them! "The bad friends of the Pope" It's a cold evening in Marc. There is new pope appointed. How can you validate in just 30 minutes connections with dictator Videla, if any? The killing of Ghadaffi A Syrian reporter claims Gadaffi is killed. Your mission, if you accept it, is to prove he is wrong or right that night. The secret plane A prototype of a new plane lands secretly in Amsterdam. Everyone denies. How do you proof it's true? This sessions is a one of three sessions about Verification Handbook, supported by European Journalism Centre, EJC. avatar for Rina Tsubaki Rina Tsubaki Project Lead, European Journalism Centre Rina Tsubaki leads and manages the Verification Handbook and Emergency Journalism initiatives at the European Journalism Centre in the Netherlands. Emergency Journalism brings together resources for media professionals reporting in and about volatile situations in the digital age, and she has frequently spoken on these topics at events, including a U.N. meeting. Previously, she managed several projects... Read More → avatar for Henk van Ess Henk van Ess Investigative Team, Bellingcat UK Friday October 9, 2015 14:30 - 15:30 CEST Birkebeiner 2 (Data Presentation) Attendees (0)
global_05_local_5_shard_00002591_processed.jsonl/32418
1. 01 Nov, 2013 1 commit 2. 28 Aug, 2013 1 commit • mattl's avatar mattl authored 'lib' and perhaps some others in the future). 3. 21 Aug, 2013 1 commit • mattl's avatar IMPORTANT: Making prev. Memcached_DataObject working again with schemaDef · 3a7261f7 mattl authored Lots of the Memcached_DataObject classes stopped working when upgraded to Managed_DataObject because they lacked schemaDef(). I have _hopefully_ made it so that all the references to the table uses each class' schemaDef, rather than the more manual ColumnDef stuff. Not all plugins have been tested thoroughly yet. NOTE: This is applied with getKV calls instead of staticGet, as it was important for PHP Strict Standards compliance to avoid calling the non- static functions statically. (unfortunately DB and DB_DataObject still do this within themselves...) 4. 18 Sep, 2011 2 commits 5. 23 Jan, 2011 1 commit • Evan Prodromou's avatar make 'admin' a safe user name · e53793ed Evan Prodromou authored 'admin' is a pretty common username that people try when installing; it was blacklisted because all of our admin panels were at /admin/*, which would conflict with the admin user's namespace. Changed the location of all admin panels to /panel/*, blacklisted the nickname 'panel', and allowed 'admin'. Tested with a fresh install; seems to work great. 6. 03 Oct, 2010 1 commit 7. 05 Jul, 2010 1 commit 8. 13 Jun, 2010 2 commits 9. 01 Jun, 2010 12 commits 10. 28 Apr, 2010 9 commits
global_05_local_5_shard_00002591_processed.jsonl/32426
Glue42 Excel and Zapier Integrating Excel and Formstack One of our beta users works in the property services department of a large organisation. He focuses on compliance, working to ensure that all of the properties his department manages are maintained to the required standards. As part of his job, he has to feed raw data collected by a surveying team into a set of Excel spreadsheets. The department organizes these sheets in Sharepoint and then uses them to build Business Intelligence dashboards. The surveying team uses Formstack to compile reports; they use tablets to access the forms on the go, as they conduct site visits. Before they used Zapier and Glue42, the process was to manually dump all the reporting data into the relevant Excel spreadsheets before moving on to work on the modelling required for the BI dashboards. Working with data from over 80 sites meant that this data transfer took up a lot of time. The user was able to set up a Zap integrating Formstack with Excel to automate this process. New responses in the forms are now Zapped into the spreadsheet that he uses for BI dashboarding. This means he can spend more time on reporting and analysis, instead of losing hours lifting data between Formstack and Excel. Managing user pins with Excel and Gmail We’ve simplified the description of this use case; we want to focus on the workflow rather than the complexities of managing secure user credentials. An organisation has a spreadsheet with user names, email addresses and a pin code that it assigns to users to access certain functions. The pin code is generated using some ancient VBA code that creates the pin from a hash of the user’s name and the current date and time. The same VBA also inserts the pin into a security database which is used when the user accesses the functions. No-one wants to change this, as it works, but manually editing the pin into an email and sending it to the user is a potential source of errors. Using Zapier with Glue42 Excel lets them automatically send an email through Gmail whenever the pin is changed. The Glue42 ‘Row Updated’ trigger initiates an action in Gmail, uses the email address column for the “To” field of the email and inserts the new pin code into the body of the email, wrapped in appropriate text. The user name column is also inserted into the body of the email to personalise it. Your new pin code is Best regards The support team”
global_05_local_5_shard_00002591_processed.jsonl/32427
blob: 5db968266152b19c1ea7c427b24a162248456e43 [file] [log] [blame] # Copyright 2011 The Go Authors. All rights reserved. # license that can be found in the LICENSE file. # The script outputs a dependency file for a package. The # dependency file is then included in the libgo Makefile. This is # automatic dependency generation, Go style. # The first parameter is the name of the file being generated. The # remaining parameters are the names of Go files which are scanned for # imports. set -e if test $# = 0; then echo 1>&2 "Usage: OUTPUT INPUTS..." exit 1 deps=`for f in $files; do cat $f; done | sed -n -e '/^import.*"/p; /^import[ ]*(/,/^)/p' | sed -e 's/^import //' -e 's/^[^"]*"/"/' | grep '^[ ]*"' | grep -v '"unsafe"' | grep -v '%' | sed -e 's/^.*"\([^"]*\)".*$/\1/' -e 's/$/.gox/' | sort -u` echo $output: $files $deps
global_05_local_5_shard_00002591_processed.jsonl/32435
Why Ego Helps the Hackers I’ve been hacked. The other day, hundreds of spam, ‘phishing’ messages were sent out as DMs, completely unbeknown to me, to my followers on Twitter. Very irritating for them, and eventually so many were sent that the DM feature on my Twitter account was paralysed. Thanks to a swift response from both the ever-helpful @SuzanneCollier and from Twitter, the problem is – I hope – now resolved.How had this happened? How had an anonymous computer programme got its virtual fingers into my password-protected account? I have to confess that I was duped by a similar DM I’d received that morning, appearing to be from one of my contacts. Excuses such as ‘I couldn’t see the interface properly on my iPhone’, ‘I didn’t really read the message’ and ‘a virus must have just burrowed its way into my account’ are plausible (just!), but if I’m honest, not applicable in my case. What drew me in was the message itself. “When I saw this about you I could not stop laughing ha ha”. This was followed by a web link, which later turned out to be sinister and powerful enough to spam everyone who follows me. With even the briefest of pauses for analytical thought, logic would have told me that this particular contact, with whom I’m not in very regular correspondence and with whom my relationship is professional rather than chummily silly, would not in a million years have sent me this message. And if the million years were up, and he I were bent over our respective screens, haggard and grey beyond reason, and he had in fact sent me the message, he would have written and punctuated it more elegantly. What happened was that my ego kicked in and eclipsed any such rational considerations. I wanted to see what he’d seen about me. I was curious as to the amusing turn my online image seemed to have taken. Again, I could offer dissembling platitudes here about ‘needing to monitor my personal brand’. But the truth is I couldn’t resist peeking, for no other reason than I wanted to see what had been written about me online. I’d never have clicked through to an unknown sales link, but the lure of attention on me me me was too strong to withstand. If someone told you they’d seen you on TV, say in the background of an ad or a documentary, would you take a look? My betting is that many of us would. There’s something irresistible in seeing ourselves mirrored as others see us, and now we have the parallel world of online reality, it’s a much more common occurrence. So vanity clicked that link and in doing so, my ego unwittingly opened the door to the hackers. And judging by the involuntary DMs I’ve received from other Twitter friends, I’m not the only one whose ego represents a blind spot in online security … One thought on “Why Ego Helps the Hackers Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/32445
I know a few scriptures, but do I really believe the scriptures I read? Not always. Came across the Jabez prayer about fifteen years ago. Flippantly, read the book and shelved it, mentally! I wanted to believe the little prayer book, but thought it could not be that easy! Always the type of person who made things much more difficult that need be. So, of course, such a simple prayer, could never yield those type of results I was looking for. So I thought! It did not happen in a shocking, miracle kind of way at first. Yet, over time, things began to change. Every area of my life, personal, career, hobbies, things began to branch out into paths I never thought of. Twist and turns of a road less traveled in my life, up until then, now seemed straight as an arrow toward some purpose, some distinct pattern of sorts. I wish I could say, its been blissful every since, but it hasn’t. Something so simple in life, can be so easily taken for granted, forgotten about and for gone in your past memory. And for me, it was forgotten in all the business of life. And life came crashing down, until I decided to listen again and let go of the control. It worked, the prayer that is, up until I decided to take it in my own hands and will it into existence on my own accord not GODS. Your Will Be Done People, every since the book was written, has questioned, whats behind the prayer? Why is it so influential in peoples lives? Why did GOD bless Jebaz and others so much, on a simple, no drama prayer? Here’s the answer. In translation, the simple little paryer of Jabez can be summed up into, “Thy Will Be Done, LORD” Now if you just said to people, prayer, thy will be done, you probably would get tons of resistance, we just want to control and hang onto everything, and letting go of control outright is crazy challenging. However, if you put in a story form and word it slightly different, maybe we receive the message a little easy. Will Power I’ve learned personally and in my career as a care giver of sorts to the elderly, that there is something very powerful about ones WILL. Something even medical professionals cannot explain. The key is, tapping into such a power. And that more than anything, is about letting go, rather than tapping in. Our WILL POWER is naturally there, its the pride, fear and denial that covers its power up. Expanding ones territory is more about letting go of the past and allowing GOD to enter into your life in ways unimaginable. Bless me indeed oh LORD, and allow the flood gates to open all the while protecting me from prideful, fearful, deniable thoughts at the same time giving me everything I ever wanted in life. The Messenger
global_05_local_5_shard_00002591_processed.jsonl/32470
Tomato and Brenda’s A Photo Study: Sub-framing Sub-framing is the subject of Brenda’s photo study this week. She explains it well. I have subscribed Ted Forbes’ YouTube Channel for a while and I had watched Ted’s video on sub-framing before (I think he has more than one on this subject). Still, I learned something new from reading Brenda’s post. Thank you, Brenda. (On the lighter side, Maddie and Josh, Photograph Down Under, has a short video on sub-framing also. You can click here to see it.) First, here are 3 photos I took at the farm. Then, here is a photo of one tomato and three apples. I don’t really know how the idea of this tomato photo came to me. My guess is that it has something to do with my recent discussion with a blogger on lessons learned in life. There were times in the past that I had worked hard to be a part of a group. On the surface, people in the group did treat me as one of them, but later things happened and I found out I wasn’t one of them. I felt being rejected; I felt hurt and sad. I didn’t understand what went wrong. I laugh at this matter now. They didn’t reject me; we were not the same kind of people, and that’s the fact. I am not talking about skin colors. I am talking about personalities, passions, attitudes toward life… That’s my tomato story. Thank you for visiting my blog. About Helen C This entry was posted in photo and thoughts and tagged . Bookmark the permalink. 10 Responses to Tomato and Brenda’s A Photo Study: Sub-framing 1. loisajay says: When life gives you tomatoes, make tomato sauce. I’ll bring the pasta. It’ll be great! I like your tomato/apple analogy, Helen. It is sad and hurtful, but I like how you made your point. You could do an entire fruit/vegetable series on human feelings. That would be interesting. Liked by 1 person • Helen C says: Thank you, Lois. Entire fruit/vegetable series on human feelings? Ha. That would require some thinking. I am surprised at how different I look at things now from before. It would be nice to share what I know now with younger people, so they don’t have to spend many years in misery 😉 Good night. Liked by 1 person 2. Perpetua says: Oh those rotten apple! Tomato is a fruit just as much as them apples. There is a story in a picture always waiting to come out. Without your story, I could say the tomato is being fenced out, in short, bullied. Good day, Perpetua Liked by 1 person • Helen C says: Good morning, Perpetua. I am glad you read my tomato story. Ha. Actually, what carol said in her comment (below) was what I was going to say, but I didn’t want people take it in a wrong way, so I decided not to say it 😉 I am still thinking about the article you posed the other day. One lesson I have learned is that I’d probably paid too much attention to other people (their happiness, for example) and too little for myself. I’ve changed that and I am happier ever since. Have a great day. 3. carol1945 says: Oh my, I just love the tomato and apple metaphor. The way you placed the items, the way they are photographed, but then the words you expressed to go with them hit me at a deep level. For me, your photo conjures up the fact that I have never felt accepted in group settings; I always felt like a outsider. With age, I realize these feelings sometimes come from forces inside me rather than outside in them. On the other hand, sometimes it is simply real– a difference in personality, philosophic orientation, and passions. Liked by 1 person • Helen C says: Dear Carol, do you believe that what you said here is exactly what I was going to say? At last minute, I decided not to include these words, because I didn’t want people take it in a wrong way. I didn’t want people think it was because they didn’t include me so I didn’t want them. That was not what I’ve learned. we were different, that’s all. Your comment made my day! I am so glad someone understood what I wanted to say. Have a wonderful day. Liked by 1 person 4. I absolutely get that tomato story! Good shot too Helen .. 🙂 Love the first one, anything with trees has to be good Liked by 1 person • Helen C says: Thank you, Julie. sometime I think we are more complicated than we think we are 😉 I love trees, too. Every morning, I look out of the window to check our maple tree in the front and my neighbor’s willow tree in the back, and one other tree in our neighborhood. Throughout the day, whenever I have time, I will check on them again. They look different at different time because of the light. 😉 Have a wonderful day! Liked by 1 person Leave a Reply to Julie@frogpondfarm Cancel reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/32473
How is it possible to setup and configure SSL in the CQ Servlet Engine (CQSE)? Answer, Resolution An SSL listener needs to be configured in the CQ Servlet Engine to enable SSL and thus HTTPS access. The following configuration example describes how to create a keystore from scratch containing a self-signed certificate using the Java keytool [1] command. First of all, a new keystore file including a self-signed certificate needs to be created. To do this, run the following on a command-line: $JAVA_HOME/bin/keytool -genkey -alias localhost -keyalg RSA -keystore /path/to/my/keystore During the process, some information has to be provided, e.g. name of the certificate holder, company name, keystore and key password. Once the keystore has been created, the CQSE needs to be reconfigured. Edit the server.xml configuration file and add a <listener> section to the <container> block as follows: After a restart, the CQSE will be accessible via HTTPS. Due to the fact that a self-signed certificate is in use, browsers will display a security warning. In order to deploy a proper SSL certificate provided by an official certificate provider, such a certificate needs to be imported into the keystore of the server where the CQSE is running. Applies to CQSE 4.x
global_05_local_5_shard_00002591_processed.jsonl/32478
0 Ayam Nyiur Recipes Looking for ayam nyiur? Here is our collection of 0 delicious meal ideas, including: Stop Wasting Time Searching for Recipes Let them come to YOU with HeyFood   Over 5,000 recipes like this one, matched to your tastes   Eliminate the age-old problem "what's for dinner?"   Support for most major diets and allergies No, thanks
global_05_local_5_shard_00002591_processed.jsonl/32492
HoP 321 - Judith Herrin on Byzantium and Islam March 24th, 2019 Historian Judith Herrin joins us to talk about competition and mutual influence between Islam and Byzantium. HoP 320 - People of the South - Byzantium and Islam March 10th, 2019 Intellectual exchange between Christians and Muslims, and the later flowering of Syriac literature including the philosopher Bar Hebraeus. Play this podcast on Podbean App
global_05_local_5_shard_00002591_processed.jsonl/32508
Categories: , A spectator selects a card from a deck, but is asked not to reveal its identity. An Eye Chart, in the form of a large plaque, is displayed on both sides. One side is simply printed EYE CHART whilst the other contains the usual lines of letters, these becoming smaller as they go down the chart. Holding the chart in front of the spectator, he points to different lines of letters, and here, funny gags are introduced. Even the last line, in very tiny small letters – You need to go to Specsavers brings about a few chuckles. When the performer hinges over the card, a cut-out section appears and blocks out most of the letters, but leaves the letters K O F D showing through.
global_05_local_5_shard_00002591_processed.jsonl/32514
Swissport International Ltd. Get weekly updates, new jobs, and reviews What are the shifts in the company 2 answers • Day shift ----4 to 12...night shift-----0200 to 1000,,, • 24hr rota, mostly early mornings but afternoon and night shifts are frequent enough 1. What are the shifts in the company
global_05_local_5_shard_00002591_processed.jsonl/32526
, , , , “Why are you doing this to me??” The wail comes at me just as I am trying to take my first sip of coffee. I have no idea what I have done now, but I’m rather sure it is some profound horror, perhaps feeding a homework paper to the dog or super gluing the lid to the toilet seat down…. “You have stolen my socks!” Ah yes, that. I had forgotten about that on account of the fact that I am usually busy stalking false prophets or relentlessly harassing corrupt congresscritters on the internet. It is only in my weaker moments that I seek such a soft target as you… “Why can you not just put my things where they belong?!” Well, mostly because they tell me you are a visual child, meaning anything not heaped in a pile in plain view has now ceased to exist in your universe…..Also, I stopped looking after your things about 3 years ago when you fired me due to my apparent incompetence. Wait, don’t tell me, you have now stepped on something with your bare feet, the same bare feet I have caused by hiding your socks? Oh my, is it the box of thumbtacks you left on the bathroom floor under the pile of dirty laundry, the same tacks I asked you 3 times to pick up last night so no elderly people around here would be compelled to break a hip? Karmedic justice indeed….comical…. Hold on, surely such entertainment requires a second cup of coffee… Okay I am back with the band aids. No, you are not dying. There is very little blood and I rather dutifully got you a tetanus shot already, so unfortunately no chance of developing lock-jaw, either. I have paid the price of such carelessness so many times, I have finally resorted to wearing combat boots around the house. You should consider this safety measure. If you wish to run around barefoot outdoors, that is fine, just don’t ever try it in this house. “Where are my socks??” Such accusation! Such resentment and outright hatred in your eyes. Surely you realize that if I wished to torment you I am capable of inflicting far greater misery then you can even imagine? Do you not even know your own mother??! Oh the things I could do, slow dripping faucets left on all night, no pop tarts in the cupboard, nothing in the fridge but four empty milk cartoons, sticky messes laying about delicately draped with a paper towel, as if out of sight really is out of mind, gone in an instant, problem solved…. Why, I could hide thumbtacks under dirty clothes, distribute marbles and barbie shoes strategically about the floor, fill my pockets with bubble gum and toss my things carelessly in the dryer melting everything with a purple crayon into a massive clump of sticky goo…. I could sit about the house shrieking relentlessly about this drama or that drama, angst ridden, melodramatic, self absorbed… I could then clone myself, invite over 8 or 9 other angst ridden and drama driven strays, needing dinner…..while also demanding to know, why is there never enough food in this house anyway? Where does it all go?? You, if I wished to truly torment you, I would simply become you….. “My socks? Hello! Why do you never listen to me?” You demand this answer rather impatiently, without compassion, having no awareness of how difficult it is to be an evil minion always plotting and conspiring assorted torments to use against people. Do you not understand how much thought must go into these things?  Cruelty does not just manifest its own self you know! “Oh, I have finally found them! Thank you!” But. I. Did. Not. Hide. Them…. I did not even try to find them, either! In fact, I do not even seem to be having this conversation at all. You are having this conversation all by yourself. I am not even here, not really…. Someday perhaps you will have the eyes to see, but for a season I am to be rendered invisible, wraith like, inconveniently lurking about this house, an annoyance really,  seeking only to gleefully harvest people’s socks….
global_05_local_5_shard_00002591_processed.jsonl/32528
2 Corinthians 6:17 Be Separate Paul quotes from the Old Testament about how God wants to be the God of the Israelites and wants them to be His people. At that time God wanted the people to get out from the other nations and be separate. A few thousand years later, Paul is using those same quotes to the believers to still come out from the other people and be separate. People will often question what it means to be separate from those in the world. They look at the Gospels and see Jesus eating with the sinners. When you look at Jesus you should notice that He was among the sinners, but did not act like them. He was separate, even while among them. The world wants every believer to look and act just like them. People do not like change or someone different. Often if someone is different, one person feels that there must be something wrong with themselves, and that is usually the person who is not different. There are some in the church who blend into the world. When they are seen in a public place, there are no signs that they are a believer. They will do the same things the world does and never state that doing or saying something is wrong. This is not being separate. As a believer you must not touch unclean things. The touching here is physical touch, watching, doing, participating in, using, or saying something in any way that is sinful. You are to be separate. You are to be different. Just as foreigners in a land is different from the natives of the land, so you are to be different in this world. You have a different culture to live by. Your culture is from heaven, and not of this earth. God wants to be your God. God wants you to be His child. This cannot happen if you stay a part of the world and live like the world does. Turn from sin today and follow God. Be separate. Be different. I pray today that God will give you the power to turn from worldly ways; that God will guide you in not touching anything sinful; that you will be separate from the world; that you will stand out for Jesus; and that God will draw many to Jesus through you. Mark 5:30 Touching Jesus “At once Jesus realized that power had gone out from him. He turned around in the crowd and asked, Who touched my clothes?” Mark 5:30 Jesus was walking along and talking with many people. There was a large crowd around Him pressing in to be close to Him. Suddenly He makes this statement of asking who touched His clothes. The disciples are surprised because there is a large crowd. They look at that many people are touching Jesus, but Jesus meant something different. Jesus was talking about someone touching Him with faith. A woman who was sick, touched His garment and she was instantly healed. Jesus knew this. Many people like to call upon Jesus and claim to be Christian. They claim it because of parents or close friends and family, but not from the heart. These people are just going through the motions of following and believing in Jesus. Their heart is really not in it. If you do not have faith in Jesus it is impossible to please God. This woman had faith in Jesus, and so when she touched His garment, it pleased Him. It got His attention. How many times does a person call out to Jesus for something, but really does not have faith that He will answer it? You may want Jesus to do something, but don’t believe in it happening. You need to know that God does love you. You need to know that God does want the best for you. You need to know that God will hear you if you believe. You need to believe that Jesus does hear and will meet your needs. In the busyness and chaotic movement of life, remember that Jesus does know you personally. Reach out to Him in faith, believing He will answer you. Also, be willing to accept the answer He gives you. Although there are crowds around Jesus, He will know and hear the one who touches Him in faith. I pray today that God will strengthen your faith in Him; that you will believe that Jesus hears and answers you; that you will call upon Jesus in faith; and that God will meet your needs in the best way possible.
global_05_local_5_shard_00002591_processed.jsonl/32556
Making stone out of seawater by Janice Nigro Stony corals fool us. We see only a big mountain of what appears to be lifeless rock before us, when in fact the mountain of rock is growing daily (in healthy reefs) due to the hard work of the macro animals and their algal symbionts, zooxanthellae, living inside. Scientists have long known which molecules constitute the stony skeleton that we recognize as coral, a particular crystal form of calcium carbonate called aragonite, but there hasn’t been agreement on how it gets there. One view has been that the process is dominated by environmental/seawater conditions and basic physical/chemical principles. The other suggests that the process is largely driven by biology. The distinction is important, especially today. One theory has rather ominous implications for the lifespan of our coral reefs based on poor ocean ecology. The other places a certain amount of destiny in the survival of our reefs on the coral animals themselves. Studies have led scientists to recently conclude that formation of the coral skeleton is largely driven by biological events. Meaning, the coral polyp is in charge. High resolution imaging and microscopy revealed a stepwise process that begins with the generation of an organic foundation favorable for the formation of aragonite crystals. A specific set of proteins secreted by the coral polyp make up this organic layer and attract nanoparticles (magnesium) which are the seeds for aragonite crystal growth. The coral animal creates the space, essentially directing localization of mineralization. It’s truly a bit of Harry Potter magic-making stone out of seawater-engineered by a pair of simple organismal collaborators. A more relevant question then is what conditions stimulate and/or inhibit coral polyps in producing these proteins and influencing skeletal growth. The results present the interesting conundrum that coral growth might be more robust than previously thought because of a level of independence from the seawater environment. Does coral just do its thing despite changes in seawater such as PH? We don’t get off the hook to further assault our oceans. Warm temperatures and increased acidification affect stony corals, in part through the loss of their algal symbionts. The zooxanthellae are required for coral growth, and loss of the zooxanthellae is what we know as coral bleaching. The algae produce glucose, glycerol, amino acids, and oxygen, which are all essential nutrients for the coral polyps, as well as remove waste. The symbiont performs these functions through photosynthesis which incorporates the coral waste product of CO2, essentially recycling it just as trees and plants do for us on land. I am always amazed at the delicate arrangements that have evolved between organisms to support life in our oceans. It makes sense that coral has developed capabilities to live under potentially more extreme changes in environment-it has survived after all for hundreds of millions of years. At the same time, I think of something a guide once said to me at the site of some ancient temples in Sicily. “You would think that natural disasters would have had the greatest impact in the deterioration of these temples over time. But in fact it is man, our wars and our ability to pick the most vulnerable point in the structure, which can destroy an entire temple in an instant.” So if you are wondering if you can rest your hand on that coral head, the answer is don’t do it. There is something in there. And it’s busy making magic. ©Janice Marie Nigro/ Looking for a scientific editor or writer? Contact Janice Nigro at Janice Nigro Scientific Editing and Writing. I have published in Cell, Science, and Nature, and articles I have edited have appeared in Cancer Research, PLoSONE, the Journal of Surgical Oncology, and Oncotarget. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s Blog at Up ↑ %d bloggers like this:
global_05_local_5_shard_00002591_processed.jsonl/32559
Creation of a hybrid mobile application, part 3 Author: Daniel Jozsef July 23rd, 2012 , , , , , , In the last post, I went through the basics of creating a PhoneGap project for iOS, and now as promised, I will go through the basics of Objective-C programming, and JS debugging inside PhoneGap. Objective-C boot camp Assuming that you come from a JavaScript, JAVA or .NET background, Objective-C can be a very confusing language to wrap your head around. However, once you understand the “NeXT” way of thinking, you will be fine, contrary to the first impression of many, this language is not rocket science. For a little history, Objective-C was an obscure language until it was chosen for UI programming at NeXT, the company Steve Jobs founded after he was fired from Apple in the ’80s. When Steve returned to Apple and brought the language with him, its road to stardom was paved. However, there is something you must understand about Objective-C. It was first created in 1983, the same year C++ was born. All languages you might consider “normal” today, JAVA, JavaScript, C#, even PHP are, to various degrees, children of C++. Objective-C took a different evolutionary route, and is the sole member of its remarkable bloodline. If it were an organism, we would call it a living fossil. Contrary to C++, which built its object-oriented paradigm on the C struct, Objective-C retained C as an unchanged whole, and added an object-oriented layer based on the (now extinct) language SmallTalk. So the first lesson is that Objective-C is ANSI C. If you know how to do something in ANSI C, you can do it in Objective-C the same way. Objective-C is not managed code in the sense JAVA or .NET is, but it does come with a runtime component. The only thing you need to know about this is that it helps mostly in memory handling, which is a bit more hassle than in true managed languages, but a lot less so than in C++ or plain ANSI C. Objective-C code uses the same modular philosophy as C++ and ANSI C, with header and implementation files. Header files use the standard .h extension, while implementation files are .m. Classes consist of an interface and an implementation, with the interface in the .h file. You can “repeat” the interface in the .m file as well, which is the only way to make methods private in Objective-C (ie. you only include the “public” methods in the .h file, and the “private” ones only in the .m file). Declaring classes and methods This is how the interface of an Objective-C class looks like: NSObject is the base class of the Objective-C runtime, similar to Object in .Net or JAVA. All classes you declare must inherit from either NSObject, or one of its child classes. The following brackets would hold the fields of the class, with similar syntax to a C struct, but it is considered an antipattern to declare the instance variables (fields) in an interface, usually you declare them in the implementation. Following the closing bracket, you give the method declarations. And this is where things become weird. Method calls in Objective-C are called messages, and true to its name, methods are very “eloquent”. What you could consider the method name is interspersed with the arguments, with argument types given in brackets before the argument names. There is no overloading, instead similar methods with different argument types are named accordingly, as you can see in the above example as well. In C#, these two methods would look like this: The return type is given in the bracket prefixed to the method name, and the – at the beginning of the line signifies an instance method. Class (ie. static) methods are prefixed with a + sign. Calling a method (sending a message) looks like this: Let me explain. The square brackets signify a method call. First comes the pointer to the class instance. (With classes, you only ever use pointers, so you can safely forget about the pointerness, and just treat it as a reference object similar to Java.) Then the message, which, in this example is to call the first method of the class with 5 and “Hello World!”. The “at” sign in @”Hello World!” tells the compiler to create a constant Objective-C NSString object as opposed to a C character array. The value of this expression is the return value of the method, a reference to an NSString object. You can also safely embed ANSI C calls in Objective-C messages, or Objective-C messages in ANSI C calls like this: (Oh by the way, in Objective-C, it is customary to use YES and NO as boolean constants.) The implementation of a class looks similar to the interface, but here you include the body of the methods as well: And this is pretty much all you need to get you over the gap and into the realm of Objective-C. Naturally it is not all of the language, but it’s the most confusing part of it. One more thing left to tackle before giving you some links for further reading, and moving on. Memory management and object lifecycle This only pertains to Objective-C objects, any traditional ANSI C data structures you will use must be handled according to ANSI C memory management guidelines. Objective-C uses reference counting for memory management purposes, which basically means that an object “knows” how many references exist to it, and destroys itself when the last of them is severed. Unless you use a modern improvement to the language known as automatic reference counting (which is, unfortunately, unavailable if you use PhoneGap), you will have to make sure to always “tell” your objects what they need to know about the references you hold to them. Creating an object looks like this: Alloc creates the object with a reference count of 1, and init is, well, sort of like the constructor. It is mandatory to always call “an” init, and use its return value as the reference to the object, as it may change its location in certain cases. So this is NOT correct, NEVER do this: If you wish to override the default “constructor”, or create an alternative constructor, you should override init, or create a new init method. Make sure to call an init method of the superclass! (While we are here, you should know that the keywords for “this class” and the superclass are respectively “self” and “super”.) This is why I wrote calling “an” init is mandatory. Let’s imagine that SomeClass can be created from an integer, a string, or can be created empty: Objective-C is a very convention-oriented language. Init methods and only init methods should start with “init”. This is a convention, not an enforced language rule. If you own an object, you need to call release on it before you drop it: The tricky thing is knowing WHEN you own it. Not always. If you call release on an object you do not own, you will get a runtime error. It is really beyond the scope of this post, but Objective-C has a thing called the autorelease pool. You can add objects to this pool, and they will be automatically released when the main loop of the application (or whatever smaller code block you set as a new autorelease pool) finishes. I suggest you read up on this, but the first thing you need to know is when an object you get from a method call is autoreleased, and when not. If the object was the return value of a method the name of which begins with (or is) “alloc”, “copy” or “new”, then you own it, and will need to call release on it when you are finished with it. If the method name does NOT start with any of these three words, then the object is autoreleased, and you must not call release on it. (Corollary: If you are creating a class, and return a non-autoreleased object in a method, you MUST name your method according to convention, starting with either “alloc”, “copy” or “new”.) However, if you want to STORE an autoreleased object, such as place it in an instance variable of an object, you must take ownership of it. This is possible via the retain method: Naturally, when you are finished with the reference, say, the entire class is being disposed of, or you simply replace it, now you own it, so you can, and need to call release on this object. And this leads us to the final topic, destructors. To do destructor logic in an Objective-C class, you need to override the “dealloc” method, and release all objects owned by the instance. (And of course make sure to call the dealloc method of the superclass as well!) However, you NEVER directly call dealloc. You only ever call release. And that is all for today, please have a look at Apple’s official Objective-C programming guide: This turned out longer than I expected, so I’ll be giving you the secret methods of debugging JavaScript in PhoneGap in a few days. , , , , , ,
global_05_local_5_shard_00002591_processed.jsonl/32562
bacon1 - Are we hard-wired to crave bacon? Photo courtesy of NPR I’ve known more than one person who claimed to be vegetarian “except for bacon.” When it comes to stories  of falling—or jumping—off the meat-free bandwagon, bacon is a commonly-named culprit. I’ll even admit that the fact that I have no intention of ever declaring myself a vegetarian has something to with how the smell of bacon does something crazy to my brain during a certain time of the month. Though the idea of picking up a strip and eating it just doesn’t seem appetizing to me, no way am I going to freak out if I find a little in a bowl of soup at a restaurant or some pancetta in my pasta. There are more important other things to worry about in life than a few surprise bits of pork belly. And besides, I believe that cravings are something we should listen to or at least make an effort to understand, and I’m fascinated by the fact that when I’m losing blood, I have an intense desire to gnaw on a piece of salty, fatty pork flesh (whether I go there or not is another thing entirely). What does it all mean? NPR asked several scientists about bacon and its “gateway to meat” status. Johan Lundstrom, a scientist who runs a lab at the Monell Chemical Senses Center and studies how the brain processes sensory information like smell, suggests that because bacon is one- to two-thirds fat and also has a lot of protein, it appeals to “our evolutionary quest for calories.” Additionally, because most of what we taste is actually related to smell, the powerful scent of bacon hits that much harder, priming us for how good it’s going to taste. “There’s an intimate connection between odor and emotion, and odor and memory,” Lundstrom says. “When you pair that with the social atmosphere of weekend breakfast and hunger, bacon is in the perfect position to take advantage of how the brain is wired.” I don’t know about you, but I think that makes complete sense. While I don’t think bacon is something people should eat in large quantities and I have my misgivings about the pork industry, I would be more likely to recommend that someone occasionally buy a small amount of high-quality bacon from a farmer or reputable butcher than to attempt to satisfy their craving via mass amounts of processed “fake” bacon. Obviously, that’s just my “I’m a fan of real food” opinion—take it or leave it. I’m really curious to hear what you think. Do you think we’re hard-wired to crave foods like bacon? Do you think this kind of thinking of ridiculous? Thoughts on bacon in general... Hungry for more? Powered by ConvertKit
global_05_local_5_shard_00002591_processed.jsonl/32567
Neurosurgical treatment of cancer pain Robert W. Hurley, Fred A. Lenz Research output: Chapter in Book/Report/Conference proceedingChapter Over the past 30 years, there have been significant changes in neurosurgical approaches to the treatment of cancer pain. Specifically, there has been a substantial decrease in the number of ablative procedures and an increase in the number of interventional pain and implantation procedures for treatment of chronic pain. The application of ablative surgery has been diminished in part because of the increasing recognition that some types of persistent pain are the result of injuries to the nervous system. In the treatment of pain of malignant origin in patients with a life expectancy of less than 3 months, this is often less of a concern, as the pain relief provided by the procedure is often good for the patient's remaining life. The indications for all pain treatment, particularly neurosurgical treatments, are dependent on the type of pain. Nociceptive pain refers to pain arising from the activation of peripheral nociceptors and transmitted to the central nervous system through intact somatic sensory pathways. Examples of nociceptive pain include acute cancer pain secondary to invasion of bone. This pain has been said to respond well to opiates. Neuropathic pain refers to pain arising from injury to the nervous system either peripherally, such as malignant invasion of pancreatic cancer into the celiac plexus or diabetic peripheral neuropathy, or centrally, such as post-stroke pain. It has been suggested that central pain does not respond to opiates, although this is certainly not universally accepted. Original languageEnglish (US) Title of host publicationCancer Pain Subtitle of host publicationAssessment and Management, Second Edition PublisherCambridge University Press Number of pages12 ISBN (Electronic)9780511642357 ISBN (Print)9780521879279 StatePublished - Jan 1 2009 ASJC Scopus subject areas • Medicine(all) Fingerprint Dive into the research topics of 'Neurosurgical treatment of cancer pain'. Together they form a unique fingerprint. Cite this
global_05_local_5_shard_00002591_processed.jsonl/32568
DayLight 2.4.14 Lamentations 3: 22-24 DayLight Prayer – Lord, How wonderful to remember your great faithfulness. When I am downcast, and the day is chewing on me, it fills my heart and lifts my spirits to know you remember me with compassion. Lord, let me be consumed by your love.  Amen. About Judy Eurey Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/32581
TY - JOUR T1 - Multidrug Resistance-Associated Protein-1 Functional Activity in Calu-3 Cells JF - Journal of Pharmacology and Experimental Therapeutics JO - J Pharmacol Exp Ther SP - 1199 LP - 1205 VL - 298 IS - 3 AU - Hamilton, Karen O. AU - Topp, Elizabeth AU - Makagiansar, Irwan AU - Siahaan, Teruna AU - Yazdanian, Mehran AU - Audus, Kenneth L. Y1 - 2001/09/01 UR - http://jpet.aspetjournals.org/content/298/3/1199.abstract N2 - The purpose of this work was to determine whether the in vitro bronchiolar epithelial cell model, Calu-3, possesses efflux pump activity by the multidrug resistance-associated protein-1 (MRP1). Reverse transcription-polymerase chain reaction demonstratedMRP1 gene expression in Calu-3 cells. Indirect fluorescence studies showed a basolateral membrane localization of MRP1 compared with P-glycoprotein (Pgp) that was found on the apical side of these cells. An increase in the rate of accumulation of the MRP1 substrate calcein was observed following treatment with the organic anion/MRP1 inhibitor indomethacin, the Pgp inhibitors cyclosporin A (CsA) and vinblastine, as well as conditions of energy depletion. Total calcein efflux was significantly decreased with the MRP1 inhibitors probenecid and indomethacin, while total efflux was unchanged following treatment with CsA. In the latter case, however, intracellular calcein levels postefflux were significantly greater. Probenecid and indomethacin increased calcein net secretion 2.4- and 3.5-fold, respectively. The efflux of etoposide, a known substrate for both Pgp and MRP1, was shown to be mainly Pgp-mediated by using the multidrug-resistant inhibitors quinidine (mixed Pgp/MRP1), CsA (Pgp), and MK571 (MRP1). Together, these data suggest that Calu-3 cells possess MRP1 functional activity that is subordinate to Pgp efflux. We present here kinetic analysis of calcein efflux from Calu-3 cells to support our findings. The American Society for Pharmacology and Experimental Therapeutics ER -
global_05_local_5_shard_00002591_processed.jsonl/32649
CSF 2DE Maps Cerebrospinal Fluid 2DE Maps 2DE Maps of the Human Cerebrospinal Fluid Proteome Hydrocephalus Sample (Figure 3) Normal Sample (Figure 4) • The majority of the spot identifications are in the map of the Hydrocephalus Sample (Figure 3). The map of the Normal Sample (Figure 4) is supplemental and contains only spots not identified in Figure 3. • Score = Mascot Mowse Score (Matrix Science) • CI = % Confidence Interval Calculated by GPS Explorer (Applied Biosystems) To reference information in these maps please cite: EJ Finehout, Z Franck, and KH Lee. Towards two-dimensional electrophoresis mapping of the cerebrospinal fluid proteome from a single individual. Electrophoresis 2004, 25(15), 2564-2575. Back to Resources
global_05_local_5_shard_00002591_processed.jsonl/32678
Hepatitis Antibodies: Immunoglobulins raised by any form of viral hepatitis; some of these antibodies are used to diagnose the specific kind of hepatitis.Hepatitis B: INFLAMMATION of the LIVER in humans caused by a member of the ORTHOHEPADNAVIRUS genus, HEPATITIS B VIRUS. It is primarily transmitted by parenteral exposure, such as transfusion of contaminated blood or blood products, but can also be transmitted via sexual or intimate personal contact.Hepatitis C: INFLAMMATION of the LIVER in humans caused by HEPATITIS C VIRUS, a single-stranded RNA virus. Its incubation period is 30-90 days. Hepatitis C is transmitted primarily by contaminated blood parenterally, and is often associated with transfusion and intravenous drug abuse. However, in a significant number of cases, the source of hepatitis C infection is unknown.Hepatitis A: INFLAMMATION of the LIVER in humans caused by a member of the HEPATOVIRUS genus, HUMAN HEPATITIS A VIRUS. It can be transmitted through fecal contamination of food or water.Antibodies: Immunoglobulin molecules having a specific amino acid sequence by virtue of which they interact only with the ANTIGEN (or a very similar shape) that induced their synthesis in cells of the lymphoid series (especially PLASMA CELLS).Hepatitis B virus: The type species of the genus ORTHOHEPADNAVIRUS which causes human HEPATITIS B and is also apparently a causal agent in human HEPATOCELLULAR CARCINOMA. The Dane particle is an intact hepatitis virion, named after its discoverer. Non-infectious spherical and tubular particles are also seen in the serum.Hepatitis B Surface Antigens: Those hepatitis B antigens found on the surface of the Dane particle and on the 20 nm spherical and tubular particles. Several subspecificities of the surface antigen are known. These were formerly called the Australia antigen.Hepatitis: INFLAMMATION of the LIVER.Antibody Specificity: The property of antibodies which enables them to react with some ANTIGENIC DETERMINANTS and not with others. Specificity is dependent on chemical composition, physical forces, and molecular structure at the binding site.Antibodies, Viral: Immunoglobulins produced in response to VIRAL ANTIGENS.Hepatitis C, Chronic: INFLAMMATION of the LIVER in humans that is caused by HEPATITIS C VIRUS lasting six months or more. Chronic hepatitis C can lead to LIVER CIRRHOSIS.Hepatitis B, Chronic: INFLAMMATION of the LIVER in humans caused by HEPATITIS B VIRUS lasting six months or more. It is primarily transmitted by parenteral exposure, such as transfusion of contaminated blood or blood products, but can also be transmitted via sexual or intimate personal contact.Hepatitis, Viral, Human: INFLAMMATION of the LIVER in humans due to infection by VIRUSES. There are several significant types of human viral hepatitis with infection caused by enteric-transmission (HEPATITIS A; HEPATITIS E) or blood transfusion (HEPATITIS B; HEPATITIS C; and HEPATITIS D).Hepatitis B Antibodies: Antibodies to the HEPATITIS B ANTIGENS, including antibodies to the surface (Australia) and core of the Dane particle and those to the "e" antigens.Hepatitis A virus: A species in the genus HEPATOVIRUS containing one serotype and two strains: HUMAN HEPATITIS A VIRUS and Simian hepatitis A virus causing hepatitis in humans (HEPATITIS A) and primates, respectively.Hepatitis B Vaccines: Vaccines or candidate vaccines containing inactivated hepatitis B or some of its component antigens and designed to prevent hepatitis B. Some vaccines may be recombinantly produced.Antibodies, Monoclonal: Antibodies produced by a single clone of cells.Antibodies, Bacterial: Immunoglobulins produced in a response to BACTERIAL ANTIGENS.Hepatitis, Chronic: INFLAMMATION of the LIVER with ongoing hepatocellular injury for 6 months or more, characterized by NECROSIS of HEPATOCYTES and inflammatory cell (LEUKOCYTES) infiltration. Chronic hepatitis can be caused by viruses, medications, autoimmune diseases, and other unknown factors.Hepatitis B Core Antigens: The hepatitis B antigen within the core of the Dane particle, the infectious hepatitis virion.Hepatitis A Vaccines: Vaccines or candidate vaccines used to prevent infection with hepatitis A virus (HEPATOVIRUS).Hepacivirus: A genus of FLAVIVIRIDAE causing parenterally-transmitted HEPATITIS C which is associated with transfusions and drug abuse. Hepatitis C virus is the type species.Hepatitis C Antibodies: Antibodies to the HEPATITIS C ANTIGENS including antibodies to envelope, core, and non-structural proteins.Hepatitis B e Antigens: A closely related group of antigens found in the plasma only during the infective phase of hepatitis B or in virulent chronic hepatitis B, probably indicating active virus replication; there are three subtypes which may exist in a complex with immunoglobulins G.Hepatitis B Antigens: Antigens of the virion of the HEPATITIS B VIRUS or the Dane particle, its surface (HEPATITIS B SURFACE ANTIGENS), core (HEPATITIS B CORE ANTIGENS), and other associated antigens, including the HEPATITIS B E ANTIGENS.Antibody Formation: The production of ANTIBODIES by proliferating and differentiated B-LYMPHOCYTES under stimulation by ANTIGENS.Antibodies, Neutralizing: Antibodies that reduce or abolish some biological activity of a soluble antigen or infectious agent, usually a virus.Hepatitis E: Acute INFLAMMATION of the LIVER in humans; caused by HEPATITIS E VIRUS, a non-enveloped single-stranded RNA virus. Similar to HEPATITIS A, its incubation period is 15-60 days and is enterically transmitted, usually by fecal-oral transmission.Hepatitis E virus: A positive-stranded RNA virus species in the genus HEPEVIRUS, causing enterically-transmitted non-A, non-B hepatitis (HEPATITIS E).Hepatitis A Antibodies: Antibodies to the HEPATITIS A ANTIGENS including antibodies to envelope, core, and non-structural proteins.Hepatitis, Autoimmune: A chronic self-perpetuating hepatocellular INFLAMMATION of unknown cause, usually with HYPERGAMMAGLOBULINEMIA and serum AUTOANTIBODIES.Hepatitis, Viral, Animal: INFLAMMATION of the LIVER in animals due to viral infection.Hepatitis A Virus, Human: A strain of HEPATITIS A VIRUS which causes hepatitis in humans. The virus replicates in hepatocytes and is presumed to reach the intestine via the bile duct. Transmission occurs by the fecal-oral route.Hepatitis Viruses: Any of the viruses that cause inflammation of the liver. They include both DNA and RNA viruses as well viruses from humans and animals.Hepatitis Delta Virus: A defective virus, containing particles of RNA nucleoprotein in virion-like form, present in patients with acute hepatitis B and chronic hepatitis. It requires the presence of a hepadnavirus for full replication. This is the lone species in the genus Deltavirus.Hepatitis D: INFLAMMATION of the LIVER in humans caused by HEPATITIS DELTA VIRUS, a defective RNA virus that can only infect HEPATITIS B patients. For its viral coating, hepatitis delta virus requires the HEPATITIS B SURFACE ANTIGENS produced by these patients. Hepatitis D can occur either concomitantly with (coinfection) or subsequent to (superinfection) hepatitis B infection. Similar to hepatitis B, it is primarily transmitted by parenteral exposure, such as transfusion of contaminated blood or blood products, but can also be transmitted via sexual or intimate personal contact.Hepatitis, Animal: INFLAMMATION of the LIVER in non-human animals.Antibody Affinity: A measure of the binding strength between antibody and a simple hapten or antigen determinant. It depends on the closeness of stereochemical fit between antibody combining sites and antigen determinants, on the size of the area of contact between them, and on the distribution of charged and hydrophobic groups. It includes the concept of "avidity," which refers to the strength of the antigen-antibody bond after formation of reversible complexes.Viral Hepatitis Vaccines: Any vaccine raised against any virus or viral derivative that causes hepatitis.Fluorescent Antibody Technique: Test for tissue antigen using either a direct method, by conjugation of antibody with fluorescent dye (FLUORESCENT ANTIBODY TECHNIQUE, DIRECT) or an indirect method, by formation of antigen-antibody complex which is then labeled with fluorescein-conjugated anti-immunoglobulin antibody (FLUORESCENT ANTIBODY TECHNIQUE, INDIRECT). The tissue is then examined by fluorescence microscopy.Antiviral Agents: Agents used in the prophylaxis or therapy of VIRUS DISEASES. Some of the ways they may act include preventing viral replication by inhibiting viral DNA polymerase; binding to specific cell-surface receptors and inhibiting viral penetration or uncoating; inhibiting viral protein synthesis; or blocking late stages of virus assembly.Antibodies, Anti-Idiotypic: Antibodies which react with the individual structural determinants (idiotopes) on the variable region of other antibodies.Binding Sites, Antibody: Local surface sites on antibodies which react with antigen determinant sites on antigens (EPITOPES.) They are formed from parts of the variable regions of FAB FRAGMENTS.Epitopes: Sites on an antigen that interact with specific antibodies.Molecular Sequence Data: Descriptions of specific amino acid, carbohydrate, or nucleotide sequences which have appeared in the published literature and/or are deposited in and maintained by databanks such as GENBANK, European Molecular Biology Laboratory (EMBL), National Biomedical Research Foundation (NBRF), or other sequence repositories.Murine hepatitis virus: A species of the CORONAVIRUS genus causing hepatitis in mice. Four strains have been identified as MHV 1, MHV 2, MHV 3, and MHV 4 (also known as MHV-JHM, which is neurotropic and causes disseminated encephalomyelitis with demyelination as well as focal liver necrosis).Hepatovirus: A genus of PICORNAVIRIDAE causing infectious hepatitis naturally in humans and experimentally in other primates. It is transmitted through fecal contamination of food or water. HEPATITIS A VIRUS is the type species.Hepatitis C Antigens: Antigens of the virions of HEPACIVIRUS, their surface, core, or other associated antigens.HIV Antibodies: Antibodies reactive with HIV ANTIGENS.RNA, Viral: Ribonucleic acid that makes up the genetic material of viruses.Antibodies, Antinuclear: Autoantibodies directed against various nuclear antigens including DNA, RNA, histones, acidic nuclear proteins, or complexes of these molecular elements. Antinuclear antibodies are found in systemic autoimmune diseases including systemic lupus erythematosus, Sjogren's syndrome, scleroderma, polymyositis, and mixed connective tissue disease.Antibodies, Neoplasm: Immunoglobulins induced by antigens specific for tumors other than the normally occurring HISTOCOMPATIBILITY ANTIGENS.Antibodies, Protozoan: Immunoglobulins produced in a response to PROTOZOAN ANTIGENS.Immunoglobulin M: A class of immunoglobulin bearing mu chains (IMMUNOGLOBULIN MU-CHAINS). IgM can fix COMPLEMENT. The name comes from its high molecular weight and originally being called a macroglobulin.Cross Reactions: Serological reactions in which an antiserum against one antigen reacts with a non-identical but closely related antigen.Interferon-alpha: One of the type I interferons produced by peripheral blood leukocytes or lymphoblastoid cells. In addition to antiviral activity, it activates NATURAL KILLER CELLS and B-LYMPHOCYTES, and down-regulates VASCULAR ENDOTHELIAL GROWTH FACTOR expression through PI-3 KINASE and MAPK KINASES signaling pathways.Liver Cirrhosis: Liver disease in which the normal microcirculation, the gross vascular anatomy, and the hepatic architecture have been variably destroyed and altered with fibrous septa surrounding regenerated or regenerating parenchymal nodules.Hepatitis A Antigens: Antigens produced by various strains of HEPATITIS A VIRUS such as the human hepatitis A virus (HEPATITIS A VIRUS, HUMAN).Amino Acid Sequence: The order of amino acids as they occur in a polypeptide chain. This is referred to as the primary structure of proteins. It is of fundamental importance in determining PROTEIN CONFORMATION.Hepatitis delta Antigens: Antigens produced by various strains of HEPATITIS D VIRUS.Hepatitis Antigens: Antigens from any of the hepatitis viruses including surface, core, and other associated antigens.Liver: A large lobed glandular organ in the abdomen of vertebrates that is responsible for detoxification, metabolism, synthesis and storage of various substances.Autoantibodies: Antibodies that react with self-antigens (AUTOANTIGENS) of the organism that produced them.Hepatitis, Alcoholic: INFLAMMATION of the LIVER due to ALCOHOL ABUSE. It is characterized by NECROSIS of HEPATOCYTES, infiltration by NEUTROPHILS, and deposit of MALLORY BODIES. Depending on its severity, the inflammatory lesion may be reversible or progress to LIVER CIRRHOSIS.Ribavirin: A nucleoside antimetabolite antiviral agent that blocks nucleic acid synthesis and is used against both RNA and DNA viruses.DNA, Viral: Deoxyribonucleic acid that makes up the genetic material of viruses.Seroepidemiologic Studies: EPIDEMIOLOGIC STUDIES based on the detection through serological testing of characteristic change in the serum level of specific ANTIBODIES. Latent subclinical infections and carrier states can thus be detected in addition to clinically overt cases.Hepatitis B Virus, Duck: A DNA virus that closely resembles human hepatitis B virus. It has been recovered from naturally infected ducks.Alanine Transaminase: An enzyme that catalyzes the conversion of L-alanine and 2-oxoglutarate to pyruvate and L-glutamate. (From Enzyme Nomenclature, 1992) EC Proteins: Proteins prepared by recombinant DNA technology.Viral Nonstructural Proteins: Proteins encoded by a VIRAL GENOME that are produced in the organisms they infect, but not packaged into the VIRUS PARTICLES. Some of these proteins may play roles within the infected cell during VIRUS REPLICATION or act in regulation of virus replication or VIRUS ASSEMBLY.Neutralization Tests: The measurement of infection-blocking titer of ANTISERA by testing a series of dilutions for a given virus-antiserum interaction end-point, which is generally the dilution at which tissue cultures inoculated with the serum-virus mixtures demonstrate cytopathology (CPE) or the dilution at which 50% of test animals injected with serum-virus mixtures show infectivity (ID50) or die (LD50).Carcinoma, Hepatocellular: A primary malignant neoplasm of epithelial liver cells. It ranges from a well-differentiated tumor with EPITHELIAL CELLS indistinguishable from normal HEPATOCYTES to a poorly differentiated neoplasm. The cells may be uniform or markedly pleomorphic, or form GIANT CELLS. Several classification schemes have been suggested.Immunoglobulin G: The major immunoglobulin isotype class in normal human serum. There are several isotype subclasses of IgG, for example, IgG1, IgG2A, and IgG2B.Base Sequence: The sequence of PURINES and PYRIMIDINES in nucleic acids and polynucleotides. It is also called nucleotide sequence.Cell Line: Established cell cultures that have the potential to propagate indefinitely.Antibodies, Fungal: Immunoglobulins produced in a response to FUNGAL ANTIGENS.Mice, Inbred BALB CHepatitis B Virus, Woodchuck: An ORTHOHEPADNAVIRUS causing chronic liver disease and hepatocellular carcinoma in woodchucks. It closely resembles the human hepatitis B virus.Liver Neoplasms: Tumors or cancer of the LIVER.Antigen-Antibody Reactions: The processes triggered by interactions of ANTIBODIES with their ANTIGENS.Virus Replication: The process of intracellular viral multiplication, consisting of the synthesis of PROTEINS; NUCLEIC ACIDS; and sometimes LIPIDS, and their assembly into a new infectious particle.Antigen-Antibody Complex: The complex formed by the binding of antigen and antibody molecules. The deposition of large antigen-antibody complexes leading to tissue damage causes IMMUNE COMPLEX DISEASES.Enzyme-Linked Immunosorbent Assay: An immunoassay utilizing an antibody labeled with an enzyme marker such as horseradish peroxidase. While either the enzyme or the antibody is bound to an immunosorbent substrate, they both retain their biologic activity; the change in enzyme activity as a result of the enzyme-antibody-antigen reaction is proportional to the concentration of the antigen and can be measured spectrophotometrically or with the naked eye. Many variations of the method have been developed.Antibodies, Bispecific: Antibodies, often monoclonal, in which the two antigen-binding sites are specific for separate ANTIGENIC DETERMINANTS. They are artificial antibodies produced by chemical crosslinking, fusion of HYBRIDOMA cells, or by molecular genetic techniques. They function as the main mediators of targeted cellular cytotoxicity and have been shown to be efficient in the targeting of drugs, toxins, radiolabeled haptens, and effector cells to diseased tissue, primarily tumors.Viral Core Proteins: Proteins found mainly in icosahedral DNA and RNA viruses. They consist of proteins directly associated with the nucleic acid inside the NUCLEOCAPSID.Polyethylene Glycols: Polymers of ETHYLENE OXIDE and water, and their ethers. They vary in consistency from liquid to solid depending on the molecular weight indicated by a number following the name. They are used as SURFACTANTS, dispersing agents, solvents, ointment and suppository bases, vehicles, and tablet excipients. Some specific groups are NONOXYNOLS, OCTOXYNOLS, and POLOXAMERS.Single-Chain Antibodies: A form of antibodies consisting only of the variable regions of the heavy and light chains (FV FRAGMENTS), connected by a small linker peptide. They are less immunogenic than complete immunoglobulin and thus have potential therapeutic use.Genotype: The genetic constitution of the individual, comprising the ALLELES present at each GENETIC LOCUS.Antibodies, Blocking: Antibodies that inhibit the reaction between ANTIGEN and other antibodies or sensitized T-LYMPHOCYTES (e.g., antibodies of the IMMUNOGLOBULIN G class that compete with IGE antibodies for antigen, thereby blocking an allergic response). Blocking antibodies that bind tumors and prevent destruction of tumor cells by CYTOTOXIC T-LYMPHOCYTES have also been called enhancing antibodies. (Rosen et al., Dictionary of Immunology, 1989)Lamivudine: A reverse transcriptase inhibitor and ZALCITABINE analog in which a sulfur atom replaces the 3' carbon of the pentose ring. It is used to treat HIV disease.Immunoglobulin Fab Fragments: Univalent antigen-binding fragments composed of one entire IMMUNOGLOBULIN LIGHT CHAIN and the amino terminal end of one of the IMMUNOGLOBULIN HEAVY CHAINS from the hinge region, linked to each other by disulfide bonds. Fab contains the IMMUNOGLOBULIN VARIABLE REGIONS, which are part of the antigen-binding site, and the first IMMUNOGLOBULIN CONSTANT REGIONS. This fragment can be obtained by digestion of immunoglobulins with the proteolytic enzyme PAPAIN.Immunoenzyme Techniques: Immunologic techniques based on the use of: (1) enzyme-antibody conjugates; (2) enzyme-antigen conjugates; (3) antienzyme antibody followed by its homologous enzyme; or (4) enzyme-antienzyme complexes. These are used histologically for visualizing or labeling tissue specimens.Hepatitis D, Chronic: INFLAMMATION of the LIVER in humans caused by HEPATITIS DELTA VIRUS in conjunction with HEPATITIS B VIRUS and lasting six months or more.Vaccination: Administration of vaccines to stimulate the host's immune response. This includes any preparation intended for active immunological prophylaxis.Antigens, Viral: Substances elaborated by viruses that have antigenic activity.Viral Envelope Proteins: Layers of protein which surround the capsid in animal viruses with tubular nucleocapsids. The envelope consists of an inner layer of lipids and virus specified proteins also called membrane or matrix proteins. The outer layer consists of one or more types of morphological subunits called peplomers which project from the viral envelope; this layer always consists of glycoproteins.Immunization: Deliberate stimulation of the host's immune response. ACTIVE IMMUNIZATION involves administration of ANTIGENS or IMMUNOLOGIC ADJUVANTS. PASSIVE IMMUNIZATION involves administration of IMMUNE SERA or LYMPHOCYTES or their extracts (e.g., transfer factor, immune RNA) or transplantation of immunocompetent cell producing tissue (thymus or bone marrow).Antibodies, Heterophile: Antibodies elicited in a different species from which the antigen originated. These antibodies are directed against a wide variety of interspecies-specific antigens, the best known of which are Forssman, Hanganutziu-Deicher (H-D), and Paul-Bunnell (P-B). Incidence of antibodies to these antigens--i.e., the phenomenon of heterophile antibody response--is useful in the serodiagnosis, pathogenesis, and prognosis of infection and latent infectious states as well as in cancer classification.Fluorescent Antibody Technique, Indirect: A form of fluorescent antibody technique commonly used to detect serum antibodies and immune complexes in tissues and microorganisms in specimens from patients with infectious diseases. The technique involves formation of an antigen-antibody complex which is labeled with fluorescein-conjugated anti-immunoglobulin antibody. (From Bennington, Saunders Dictionary & Encyclopedia of Laboratory Medicine and Technology, 1984)Epitope Mapping: Methods used for studying the interactions of antibodies with specific regions of protein antigens. Important applications of epitope mapping are found within the area of immunochemistry.Rabbits: The species Oryctolagus cuniculus, in the family Leporidae, order LAGOMORPHA. Rabbits are born in burrows, furless, and with eyes and ears closed. In contrast with HARES, rabbits have 22 chromosome pairs.Antibodies, Catalytic: Antibodies that can catalyze a wide variety of chemical reactions. They are characterized by high substrate specificity and share many mechanistic features with enzymes.Marmota: A genus of Sciuridae consisting of 14 species. They are shortlegged, burrowing rodents which hibernate in winter.Blood DonorsImmune Sera: Serum that contains antibodies. It is obtained from an animal that has been immunized either by ANTIGEN injection or infection with microorganisms containing the antigen.Immunoglobulin A: Represents 15-20% of the human serum immunoglobulins, mostly as the 4-chain polymer in humans or dimer in other mammals. Secretory IgA (IMMUNOGLOBULIN A, SECRETORY) is the main immunoglobulin in secretions.Time Factors: Elements of limited time intervals, contributing to particular results or situations.Carrier State: The condition of harboring an infective organism without manifesting symptoms of infection. The organism must be readily transmissible to another susceptible host.Viral Load: The quantity of measurable virus in a body fluid. Change in viral load, measured in plasma, is sometimes used as a SURROGATE MARKER in disease progression.Liver Transplantation: The transference of a part of or an entire liver from one human or animal to another.Polymerase Chain Reaction: In vitro method for producing large amounts of specific DNA or RNA fragments of defined length and sequence from small amounts of short oligonucleotide flanking sequences (primers). The essential steps include thermal denaturation of the double-stranded target molecules, annealing of the primers to their complementary sequences, and extension of the annealed primers by enzymatic synthesis with DNA polymerase. The reaction is efficient, specific, and extremely sensitive. Uses for the reaction include disease diagnosis, detection of difficult-to-isolate pathogens, mutation analysis, genetic testing, DNA sequencing, and analyzing evolutionary relationships.Hybridomas: Cells artificially created by fusion of activated lymphocytes with neoplastic cells. The resulting hybrid cells are cloned and produce pure MONOCLONAL ANTIBODIES or T-cell products, identical to those produced by the immunologically competent parent cell.Antibodies, Monoclonal, Humanized: Antibodies from non-human species whose protein sequences have been modified to make them nearly identical with human antibodies. If the constant region and part of the variable region are replaced, they are called humanized. If only the constant region is modified they are called chimeric. INN names for humanized antibodies end in -zumab.Radioimmunoassay: Classic quantitative assay for detection of antigen-antibody reactions using a radioactively labeled substance (radioligand) either directly or indirectly to measure the binding of the unlabeled substance to a specific antibody or other receptor system. Non-immunogenic substances (e.g., haptens) can be measured if coupled to larger carrier proteins (e.g., bovine gamma-globulin or human serum albumin) capable of inducing antibody formation.Immunization, Passive: Transfer of immunity from immunized to non-immune host by administration of serum antibodies, or transplantation of lymphocytes (ADOPTIVE TRANSFER).Immunoassay: A technique using antibodies for identifying or quantifying a substance. Usually the substance being studied serves as antigen both in antibody production and in measurement of antibody by the test substance.Acute Disease: Disease having a short and relatively severe course.Prevalence: The total number of cases of a given disease in a specified population at a designated time. It is differentiated from INCIDENCE, which refers to the number of new cases in the population at a given time.Genome, Viral: The complete genetic complement contained in a DNA or RNA molecule in a virus.Cells, Cultured: Cells propagated in vitro in special media conducive to their growth. Cultured cells are used to study developmental, morphologic, metabolic, physiologic, and genetic processes, among others.Antigens: Substances that are recognized by the immune system and induce an immune reaction.Hepatocytes: The main structural component of the LIVER. They are specialized EPITHELIAL CELLS that are organized into interconnected plates called lobules.Blotting, Western: Identification of proteins or peptides that have been electrophoretically separated by blot transferring from the electrophoresis gel to strips of nitrocellulose paper, followed by labeling with antibody probes.Pan troglodytes: The common chimpanzee, a species of the genus Pan, family HOMINIDAE. It lives in Africa, primarily in the tropical rainforests. There are a number of recognized subspecies.Antibodies, Antiphospholipid: Autoantibodies directed against phospholipids. These antibodies are characteristically found in patients with systemic lupus erythematosus (LUPUS ERYTHEMATOSUS, SYSTEMIC;), ANTIPHOSPHOLIPID SYNDROME; related autoimmune diseases, some non-autoimmune diseases, and also in healthy individuals.Serologic Tests: Diagnostic procedures involving immunoglobulin reactions.Sensitivity and Specificity: Binary classification measures to assess test results. Sensitivity or recall rate is the proportion of true positives. Specificity is the probability of correctly determining the absence of a condition. (From Last, Dictionary of Epidemiology, 2d ed)Flaviviridae: A family of RNA viruses, many of which cause disease in humans and domestic animals. There are three genera FLAVIVIRUS; PESTIVIRUS; and HEPACIVIRUS, as well as several unassigned species.Immunohistochemistry: Histochemical localization of immunoreactive substances using labeled antibodies as reagents.Immunoblotting: Immunologic method used for detecting or quantifying immunoreactive substances. The substance is identified by first immobilizing it by blotting onto a membrane and then tagging it with labeled antibodies.Liver Diseases: Pathological processes of the LIVER.Antigens, Surface: Antigens on surfaces of cells, including infectious or foreign cells or viruses. They are usually protein-containing groups on cell membranes or walls and may be isolated.Immunoglobulins: Multi-subunit proteins which function in IMMUNITY. They are produced by B LYMPHOCYTES from the IMMUNOGLOBULIN GENES. They are comprised of two heavy (IMMUNOGLOBULIN HEAVY CHAINS) and two light chains (IMMUNOGLOBULIN LIGHT CHAINS) with additional ancillary polypeptide chains depending on their isoforms. The variety of isoforms include monomeric or polymeric forms, and transmembrane forms (B-CELL ANTIGEN RECEPTORS) or secreted forms (ANTIBODIES). They are divided by the amino acid sequence of their heavy chains into five classes (IMMUNOGLOBULIN A; IMMUNOGLOBULIN D; IMMUNOGLOBULIN E; IMMUNOGLOBULIN G; IMMUNOGLOBULIN M) and various subclasses.T-Lymphocytes: Lymphocytes responsible for cell-mediated immunity. Two types have been identified - cytotoxic (T-LYMPHOCYTES, CYTOTOXIC) and helper T-lymphocytes (T-LYMPHOCYTES, HELPER-INDUCER). They are formed when lymphocytes circulate through the THYMUS GLAND and differentiate to thymocytes. When exposed to an antigen, they divide rapidly and produce large numbers of new T cells sensitized to that antigen.Liver Function Tests: Blood tests that are used to evaluate how well a patient's liver is working and also to help diagnose liver conditions.HIV Infections: Includes the spectrum of human immunodeficiency virus infections that range from asymptomatic seropositivity, thru AIDS-related complex (ARC), to acquired immunodeficiency syndrome (AIDS).Drug Therapy, Combination: Therapy with two or more separate preparations given for a combined effect.Complement Fixation Tests: Serologic tests based on inactivation of complement by the antigen-antibody complex (stage 1). Binding of free complement can be visualized by addition of a second antigen-antibody system such as red cells and appropriate red cell antibody (hemolysin) requiring complement for its completion (stage 2). Failure of the red cells to lyse indicates that a specific antigen-antibody reaction has taken place in stage 1. If red cells lyse, free complement is present indicating no antigen-antibody reaction occurred in stage 1.Antigens, Bacterial: Substances elaborated by bacteria that have antigenic activity.B-Lymphocytes: Lymphoid cells concerned with humoral immunity. They are short-lived cells resembling bursa-derived lymphocytes of birds in their production of immunoglobulin upon appropriate stimulation.Molecular Weight: The sum of the weight of all the atoms in a molecule.Viral Proteins: Proteins found in any species of virus.Hemagglutination Tests: Sensitive tests to measure certain antigens, antibodies, or viruses, using their ability to agglutinate certain erythrocytes. (From Stedman, 26th ed)Chronic Disease: Diseases which have one or more of the following characteristics: they are permanent, leave residual disability, are caused by nonreversible pathological alteration, require special training of the patient for rehabilitation, or may be expected to require a long period of supervision, observation, or care. (Dictionary of Health Services Management, 2d ed)Mutation: Any detectable and heritable change in the genetic material that causes a change in the GENOTYPE and which is transmitted to daughter cells and to succeeding generations.Immunoglobulin Fragments: Partial immunoglobulin molecules resulting from selective cleavage by proteolytic enzymes or generated through PROTEIN ENGINEERING techniques.Risk Factors: An aspect of personal behavior or lifestyle, environmental exposure, or inborn or inherited characteristic, which, on the basis of epidemiologic evidence, is known to be associated with a health-related condition considered important to prevent.Electrophoresis, Polyacrylamide Gel: Electrophoresis in which a polyacrylamide gel is used as the diffusion medium.Treatment Outcome: Evaluation undertaken to assess the results or consequences of management and procedures used in combating disease in order to determine the efficacy, effectiveness, safety, and practicability of these interventions in individual cases or series.Substance Abuse, Intravenous: Abuse, overuse, or misuse of a substance by its injection into a vein.Jaundice: A clinical manifestation of HYPERBILIRUBINEMIA, characterized by the yellowish staining of the SKIN; MUCOUS MEMBRANE; and SCLERA. Clinical jaundice usually is a sign of LIVER dysfunction.Biopsy: Removal and pathologic examination of specimens in the form of small pieces of tissue from the living body.DucksAspartate Aminotransferases: Enzymes of the transferase class that catalyze the conversion of L-aspartate and 2-ketoglutarate to oxaloacetate and L-glutamate. EC Proteins secreted by vertebrate cells in response to a wide variety of inducers. They confer resistance against many different viruses, inhibit proliferation of normal and malignant cells, impede multiplication of intracellular parasites, enhance macrophage and granulocyte phagocytosis, augment natural killer cell activity, and show several other immunomodulatory functions.Recombinant Fusion Proteins: Recombinant proteins produced by the GENETIC TRANSLATION of fused genes formed by the combination of NUCLEIC ACID REGULATORY SEQUENCES of one or more genes with the protein coding sequences of one or more genes.Cloning, Molecular: The insertion of recombinant DNA molecules from prokaryotic and/or eukaryotic sources into a replicating vehicle, such as a plasmid or virus vector, and the introduction of the resultant hybrid molecules into recipient cells without altering the viability of those cells.Drug-Induced Liver Injury: A spectrum of clinical liver diseases ranging from mild biochemical abnormalities to ACUTE LIVER FAILURE, caused by drugs, drug metabolites, and chemicals from the environment.Flow Cytometry: Technique using an instrument system for making, processing, and displaying one or more measurements on individual cells obtained from a cell suspension. Cells are usually stained with one or more fluorescent dyes specific to cell components of interest, e.g., DNA, and fluorescence of each cell is measured as it rapidly transverses the excitation beam (laser or mercury arc lamp). Fluorescence provides a quantitative measure of various biochemical and biophysical properties of the cell, as well as a basis for cell sorting. Other measurable optical parameters include light absorption and light scattering, the latter being applicable to the measurement of cell size, shape, density, granularity, and stain uptake.Replicon: Any DNA sequence capable of independent replication or a molecule that possesses a REPLICATION ORIGIN and which is therefore potentially capable of being replicated in a suitable cell. (Singleton & Sainsbury, Dictionary of Microbiology and Molecular Biology, 2d ed)Cryoglobulinemia: A condition characterized by the presence of abnormal quantities of CRYOGLOBULINS in the blood. Upon cold exposure, these abnormal proteins precipitate into the microvasculature leading to restricted blood flow in the exposed areas.Viremia: The presence of viruses in the blood.Immunologic Techniques: Techniques used to demonstrate or measure an immune response, and to identify or measure antigens using antibodies.Mice, Inbred C57BLVaccines, Synthetic: Small synthetic peptides that mimic surface antigens of pathogens and are immunogenic, or vaccines manufactured with the aid of recombinant DNA techniques. The latter vaccines may also be whole viruses whose nucleic acids have been modified.Hemagglutination Inhibition Tests: Serologic tests in which a known quantity of antigen is added to the serum prior to the addition of a red cell suspension. Reaction result is expressed as the smallest amount of antigen which causes complete inhibition of hemagglutination.Protein Binding: The process in which substances, either endogenous or exogenous, bind to proteins, peptides, enzymes, protein precursors, or allied compounds. Specific protein-binding measures are often used as assays in diagnostic assessments.Blood Transfusion: The introduction of whole blood or blood component directly into the blood stream. (Dorland, 27th ed)Immunoglobulin Variable Region: That region of the immunoglobulin molecule that varies in its amino acid sequence and composition, and comprises the binding site for a specific antigen. It is located at the N-terminus of the Fab fragment of the immunoglobulin. It includes hypervariable regions (COMPLEMENTARITY DETERMINING REGIONS) and framework regions.Biological Markers: Measurable and quantifiable biological parameters (e.g., specific enzyme concentration, specific hormone concentration, specific gene phenotype distribution in a population, presence of biological substances) which serve as indices for health- and physiology-related assessments, such as disease risk, psychiatric disorders, environmental exposure and its effects, disease diagnosis, metabolic processes, substance abuse, pregnancy, cell line development, epidemiologic studies, etc.Retrospective Studies: Studies used to test etiologic hypotheses in which inferences about an exposure to putative causal factors are derived from data relating to characteristics of persons under study or to events or experiences in their past. The essential feature is that some of the persons under study have the disease or outcome of interest and their characteristics are compared with those of unaffected persons.Tumor Cells, Cultured: Cells grown in vitro from neoplastic tissue. If they can be established as a TUMOR CELL LINE, they can be propagated in cell culture indefinitely.Immunodiffusion: Technique involving the diffusion of antigen or antibody through a semisolid medium, usually agar or agarose gel, with the result being a precipitin reaction.Antibodies, Antineutrophil Cytoplasmic: Autoantibodies directed against cytoplasmic constituents of POLYMORPHONUCLEAR LEUKOCYTES and/or MONOCYTES. They are used as specific markers for GRANULOMATOSIS WITH POLYANGIITIS and other diseases, though their pathophysiological role is not clear. ANCA are routinely detected by indirect immunofluorescence with three different patterns: c-ANCA (cytoplasmic), p-ANCA (perinuclear), and atypical ANCA.Antigens, CD81: Tetraspanin proteins that are involved in a variety of cellular functions including BASEMENT MEMBRANE assembly, and in the formation of a molecular complexes on the surface of LYMPHOCYTES.Glycoproteins: Conjugated protein-carbohydrate compounds including mucins, mucoid, and amyloid glycoproteins.Autoimmune Diseases: Disorders that are characterized by the production of antibodies that react with host tissues or immune effector cells that are autoreactive to endogenous peptides.Immunoglobulin Idiotypes: Unique genetically-controlled determinants present on ANTIBODIES whose specificity is limited to a single group of proteins (e.g., another antibody molecule or an individual myeloma protein). The idiotype appears to represent the antigenicity of the antigen-binding site of the antibody and to be genetically codetermined with it. The idiotypic determinants have been precisely located to the IMMUNOGLOBULIN VARIABLE REGION of both immunoglobin polypeptide chains.Antigens, Neoplasm: Proteins, glycoprotein, or lipoprotein moieties on surfaces of tumor cells that are usually identified by monoclonal antibodies. Many of these are of either embryonic or viral origin.Organophosphonates: Carbon-containing phosphonic acid compounds. Included under this heading are compounds that have carbon bound to either OXYGEN atom or the PHOSPHOROUS atom of the (P=O)O2 structure.Peptides: Members of the class of compounds composed of AMINO ACIDS joined together by peptide bonds between adjacent amino acids into linear, branched or cyclical structures. OLIGOPEPTIDES are composed of approximately 2-12 amino acids. Polypeptides are composed of approximately 13 or more amino acids. PROTEINS are linear polypeptides that are normally synthesized on RIBOSOMES.Species Specificity: The restriction of a characteristic behavior, anatomical structure or physical system, such as immune response; metabolic response, or gene or gene variant to the members of one species. It refers to that property which differentiates one species from another but it is also used for phylogenetic levels higher or lower than the species.Peptide Fragments: Partial proteins formed by partial hydrolysis of complete proteins or generated through PROTEIN ENGINEERING techniques.Immunosorbent Techniques: Techniques for removal by adsorption and subsequent elution of a specific antibody or antigen using an immunosorbent containing the homologous antigen or antibody.Antibodies, Monoclonal, Murine-Derived: Antibodies obtained from a single clone of cells grown in mice or rats.Transfection: The uptake of naked or purified DNA by CELLS, usually meaning the process as it occurs in eukaryotic cells. It is analogous to bacterial transformation (TRANSFORMATION, BACTERIAL) and both are routinely employed in GENE TRANSFER TECHNIQUES.Peptide Library: A collection of cloned peptides, or chemically synthesized peptides, frequently consisting of all possible combinations of amino acids making up an n-amino acid peptide.Recurrence: The return of a sign, symptom, or disease after a remission.Liver Failure: Severe inability of the LIVER to perform its normal metabolic functions, as evidenced by severe JAUNDICE and abnormal serum levels of AMMONIA; BILIRUBIN; ALKALINE PHOSPHATASE; ASPARTATE AMINOTRANSFERASE; LACTATE DEHYDROGENASES; and albumin/globulin ratio. (Blakiston's Gould Medical Dictionary, 4th ed)Cattle: Domesticated bovine animals of the genus Bos, usually kept on a farm or ranch and used for the production of meat or dairy products or for heavy labor.Antigens, CD: Differentiation antigens residing on mammalian leukocytes. CD stands for cluster of differentiation, which refers to groups of monoclonal antibodies that show similar reactivity with certain subpopulations of antigens of a particular lineage or differentiation stage. The subpopulations of antigens are also known by the same CD designation.Phylogeny: The relationships of groups of organisms as reflected by their genetic makeup.Binding, Competitive: The interaction of two or more substrates or ligands with the same binding site. The displacement of one by the other is used in quantitative and selective affinity measurements.Drug Resistance, Viral: The ability of viruses to resist or to become tolerant to chemotherapeutic agents or antiviral agents. This resistance is acquired through gene mutation.Spleen: An encapsulated lymphatic organ through which venous blood filters.Cell Line, Tumor: A cell line derived from cultured tumor cells.Coinfection: Simultaneous infection of a host organism by two or more pathogens. In virology, coinfection commonly refers to simultaneous infection of a single cell by two or more different viruses.Autoantigens: Endogenous tissue constituents that have the ability to interact with AUTOANTIBODIES and cause an immune response.Immunoglobulin Isotypes: The classes of immunoglobulins found in any species of animal. In man there are nine classes that migrate in five different groups in electrophoresis; they each consist of two light and two heavy protein chains, and each group has distinguishing structural and functional properties.Virion: The infective system of a virus, composed of the viral genome, a protein core, and a protein coat called a capsid, which may be naked or enclosed in a lipoprotein envelope called the peplos.
global_05_local_5_shard_00002591_processed.jsonl/32683
Because We’re A Forever Thing DSC00069 copyWednesday, February 25, 2015 Dear Will, I’ve been thinking that in the last little bit you’ve been a lot of places looking out for many that need a little more WillPower than usual. Gosh, the ones that I know about are many and the ones that you are watching over that I will never know must be countless. Maybe they beckoned you, maybe you were at the right place at the right time, and maybe you’ll never leave those who will need you always. That would be me, Will, because you and I are a forever thing. I believe that you are on the mountains in Andorra and Japan with one of the bravest and most beautiful girls we know who has skied her way into competing on the world stage in junior freeskiing. Then there’s your cousin who needs you to help heal his badly broken leg (not to mention he’ll need you to help him eat all of the candy that Pa’s been giving him 1) to keep his spirits up, and 2) to keep him anchored ON the couch). I know you’re hanging around your special childhood friend who carries you always in her heart as she works through decisions on what comes after high school and the big question, “what the heck am I gonna do now?” Wait till you see her in her grad gown, Will… she’ll be the most beautiful girl in that big room. There’s also the freestyle twins who are never without their WillPower bands, your ski racing pal who takes you to all of his races, and your ski buddy who is nursing an injury he suffered while training. I’m beginning to believe that the ski community that knew you and those who sadly didn’t but know about you now, take you with them each time they put on their skis. Be it freestyle comps or downhill races or just for the fun of it the WillPower you bring to each of them is a common thread. I am grateful too that you are sending a little extra WillPower to my dear friend who is carrying the weight of the world on her shoulders as she moves through one of life’s biggest challenges. With you on one side and me on the other we can help her, Will. We can. As busy as you are spreading about WillPower and watching over those that you care about I am ever grateful that you watch over me too. It is you who whispers in my ear “Mom, you can do this” when I’m not sure that I can. When I’m full of fraught you help me find perspective, you encourage me to look for the silver lining in life’s struggles and sometimes you tell me to crawl back under the covers for a little while. I know you’re behind my smile these days and that you’re never far away. Your footsteps are all over my heart and when I need you I just whisper your name and in you come with open arms and twinkling blue eyes, sometimes dancing or jumping and flipping, and always, always with a WillBilly smile. I love you like a bus, Little Blue, and because you and I are a forever thing, I always will.
global_05_local_5_shard_00002591_processed.jsonl/32687
Aliens Archives - Lyonesse Category Archives for "Aliens" 95 South Avery drove down the highway, his arm out the window and bouncing at the mercy of a seventy-five mile an hour wind. He’d survived the onslaught of twelve-hour days and long work-weekends that gathered until April 15th, when they disappeared as darkness does before the dawn. After the deadline, his office turned into a ghost town. Many of the CPAs took vacation, and Avery was no different. Halfway between Richmond and the North Carolina border, all he could think about was the next few days of drinking, eating, and relaxing at his friend Rick’s house. The dashboard clock ticked closer to midnight, and a classic Nineties rock tune strained the speakers. He ripped his gaze from the hypnotic flash of the white stripes in the center of the road when a single light appeared, as if from a faraway distance, and quickly grew brighter. At first he thought it might be a plane, then a helicopter as it moved closer. And then the light fell from its perch and dropped down into the trees a few miles ahead. The sound of his tires hitting the rumble strips, matching the rushing of his heart, caused him to veer back on the road. Wide-eyed, he looked all around, expecting another car to smash into him, but he was alone. He turned off the radio and flicked his eyes at the clock again. He decelerated but the ‘happy vacation’ cold six-pack and wine bottle on the passenger seat caught his attention. He hit the gas. Half a mile passed, Avery fidgeting the whole way. He looked at the clock again. “Ah, screw it,” he said. Avery pulled over at his best guess of where the aircraft fell. He turned his hazards on and pulled out his cell as a truck barreled past. He put the phone down. How come no one else has stopped? he thought to himself. Someone had to have seen it. He stepped out of his Benz and walked toward the edge of the grass. The full moon lit up a good portion of the periphery of the forest, enough to see thick, hanging branches flush with leaves, but any deeper and all he could see was darkness. No light from a potential fire. Then it dawned on him that he hadn’t heard a sound, either. He imagined the embarrassment of calling nine-one-one and having a cop come out and find nothing. “Been drinking, sir?” Damn it. I must be certain first. I know I saw something. He returned to his car and pulled out a multi-tool specialty knife and a flashlight from his glove compartment. He had gotten great use out of the knife, one of the best birthday presents he had ever been given. He turned around and aimed for the trees, his car beeping twice as he locked it. Branches, leaves, and twigs whipped at his lower legs. The crunch beneath his feet reminded him briefly of playing in numerous childhood tree houses. He looked back at his flashing hazards every ten seconds to keep a sense of direction, until the forest swallowed them up. He made a concerted effort not to veer off track, and took mental notes of specific root shapes to use as markers for his return. Just as fear began to spark terrible thoughts of getting lost, a light appeared ahead of him. There we go! I knew I saw something, he thought. Continue reading Harski licked each of his twelve fingers slowly in turn, relishing every drop of the sweet, sticky nectar. The harvest had been especially bountiful, more shining dark purple pods swelling to ripeness at the top of waxy lavender stalks than he had ever seen. The stalks were so heavy with nectar pods they bent toward the ground within easy reach. He had worked long and hard, carefully stripping the glistening globules without damaging the stalks. The only problem was how to store all those pods. Harski had already filled his two favorite hollow logs and had almost filled a small, dry cave. The cave was far from the stalk field and the pods felt heavier with every trip he made there. He rarely returned to his nest, sleeping in the open under the three Moons to save time. If he hurried, he might be able to find a second cave before moonset to store the abundant nectar. There were still a handful of sleeps to go before he’d have to hunker down in the dark. He spread his tattered lupt on the carpet of leaves in the shade next to the velvety red trunk of a hraffli tree. Lying on his back, Harski filled his lungs with the fragrant air then exhaled a contented sigh. He untucked his ear flaps, gave them a long, satisfying stretch, and brought them around to cover his eyes, blocking out the dim light filtering through the umbrella of yellow-orange leaves. He wondered if other dreffigs were having the same wonderful harvest in other stalk fields, enjoying full bellies, working hard until moonset. Did they dream, like him, of one day living in a colony with thousands of other Gwims instead of eking out a lonely existence harvesting and trading nectar? Stop it. No colony wants dreffigs, only nectar. He drifted off, wondering what life in the Great Tree Colony was like, or if he might prefer the Mountain Rocks. Harski woke with a start, instinctively thrusting his enormous ears straight up. He blinked his large, luminous black eyes, angled his head and twitched both ears searching for the source of the sound. For a moment, all he could hear was the fast thrump-thrumpity-thrump of his pounding heart. Still a long time before moonset… His nostrils, two vertical slits above his wide mouth, vibrated with terror. Too soon for— Continue reading The Artifact Continue reading
global_05_local_5_shard_00002591_processed.jsonl/32699
A Very Early Explanation of the Eucharist The slip of the vine planted in the ground bears fruit at the proper time. The grain of wheat falls into the ground and decays only to be raised up again and multiplied by the Spirit of God who sustains all things. The Wisdom of God places these things at the service of human beings and when they receive God’s word they become the eucharist, which is the body and blood of Christ. In the same way our bodies, which have been nourished by the eucharist, will be buried in the earth and will decay, but they will rise again at the appointed time, for the Word of God will raise them up to the glory of God the Father. Then the Father will clothe our mortal nature with immortality and freely endow our corruptible nature with incorruptibility, for God’s power is shown most perfectly in weakness. —Irenaeus (late 2nd century), Against Heresies 5 Did you notice the wonderful element of hope running through this ancient writing? Did you take note of God’s continuing care and providence for us, especially in our days of weakness? If not, go back and reread Irenaeus again.
global_05_local_5_shard_00002591_processed.jsonl/32710
I have a general question about sequence of functions $(f_n)$ from $[0,1]$ to reals which are non-uniformly Lipschitz (i.e., each has a Lipschitz constant $D_n$ but we don't know if it is bounded) and converge uniformly to a function with Lipschitz constant $D$. I have been thinking whether if this was sufficient to say that the set $\{D_n, n \in \mathbb{N}\}$ is bounded. I have seen here examples which give examples of non-Lipschitz functions converging to Lipschitz ones so it seems this idea may not be correct. And indeed I was able to build a counter example which is $f_n(x) = nxe^{-n^nx}$ The derivative of these functions at $0$ is $n$, so there are elements of this sequence with arbitrarily large Lipschitz constant (and each $f_n$ is indeed Lipschitz since their derivative is continuous in $[0,1]$). Moreover for these functions the maximum is achieved at $x=\frac{1}{n^n}$ with value $\frac{1}{en^{n-1}}$ so they uniformly converge to $0$. Thus this builds a counterexample. Now my question is could one add some more assumptions to such a sequence so that the Lipschitz constants would be bounded (of course no easy assumptions like the functions being differentiable and their derivatives converging etc, it should be a topological property). • $\begingroup$ Do you mean that the set $\{D_{n}:n\in\mathbb{N}\}$ is bounded? Each $D_{n}$ is bounded in your counter-example. $\endgroup$ – T. Eskin Feb 24 '13 at 14:43 • $\begingroup$ Yes I meant the set $\{D_n : n \in \mathbb{N}\}$ to be bounded. For the unbounded case there is already the example $\frac{1}{n}\sqrt(x)$ $\endgroup$ – Sina Feb 24 '13 at 14:45 • $\begingroup$ This counter-example seems to do the job. And as you noted, it is easy to make a sequence of non-Lipschitz functions converging uniformly to a Lipschitz function. Take e.g. $f_{n}(x)=\frac{1}{n}$ for $x\in\mathbb{Q}$ and $f_{n}(x)=0$ for $x\in\mathbb{R}\setminus\mathbb{Q}$. Then $f_{n}\to 0$ uniformly, but each $f_{n}$ is not even continuous. $\endgroup$ – T. Eskin Feb 24 '13 at 14:51 If I understand correctly, the question is: given that $f_n\to f$ and $f$ is Lipschitz, what additional assumptions do we need to conclude that $(f_n)$ is a uniformly Lipschitz sequence? it should be a topological property I remark that Lipschitz-ness is not a topological property, it is a metric property. If we are on a topological space without a metric, the concept of being Lipschitz does not exist. Here is a metric assumption: the sequence $(f_n)$ converges in the Lipschitz norm $$ \|f\|_{\rm Lip} = |f(x_0)|+\sup_{x\ne y}\frac{|f(x)-f(y)|}{d(x,y)} \tag1$$ The definition of norm (1) involves choosing a base point $x_0$ in our metric space; the term $|f(x_0)|$ is necessary so that the constant functions get nonzero norm. Let's check. Suppose $\|f_n-f\|_{\rm Lip}\to 0$ and $f$ is Lipschitz. Then there is $N$ such that for all $n\ge N$ we have $\|f_n-f\|_{\rm Lip}\le 1$. Hence $\|f_n\|\le 1+\|f\|_{\rm Lip}$, which is a uniform upper bound on the Lipschitz constants of $f_n$. | cite | improve this answer | | • $\begingroup$ Thanks it does not easily solve my problem (like some other easier property to check but it gives some new insight). And I guess this is the one of the most you can expect without having derivatives. $\endgroup$ – Sina Feb 28 '13 at 9:31 Your Answer
global_05_local_5_shard_00002591_processed.jsonl/32715
Java ArrayList: creating an ArrayList from splitting of a string on multiple delimiters A common task in various programming languages is to split a string based on delimiter and create a resulting array. In java we sometimes prefer to utilize collections instead of a basic array object, luckily java has the Arrays object that can be used to perform various functions on an inputted array. The Step by Step In java the String object has a built in split function that takes a regular expression as an input and returns an array of string values split by the regex. lets illustrate this by creating a new String. String str = new String("001,002,003,004;005:006"); Next lets split the string based on 3 delimiters ; , and | String[] sArray = str.split( "[,;:]" ); This will return a String array containing the values 001, 002, 003, 004, 005, and 006 as the regex [,;:] means to match any character contained between the []. Once we have our String Array we can then utilize the Arrays Class’s asList static function to convert the Array to a list to instantiate an ArrayList List sList = new ArrayList( Arrays.asList(sArray) ); If we wanted to condense the above to one line we could use the following: List sList = new ArrayList( Arrays.asList( str.split( "[,:;]" ) ); That is the process in a nut shell, don’t forget that with user supplied information you may also want to scrub your data for any invalid values or for empty values especially when your delimiter is a new line.  To do this you can easily use an Iterator or manipulate the array generated by the split function before generating the Array List. // Java // Comments & Questions Add Your Comment
global_05_local_5_shard_00002591_processed.jsonl/32720
Everything FBR Cast Podcast FBR6. USMNT Kickoff Series In our first remote recording in a good bit, Hunter sounds like a robot. He & Zander talk about the USMNT friendlies against Brazil & Mexico, which Zander attended as a credentialed member of the media for the MMITM & FBR for the first time. Then, they predict the upcoming EPL slate and cover some kicks. SoundcloudListen-on-Apple-Podcasts-badgeStitcher Logo Listen on Google Play Music Leave a Reply %d bloggers like this:
global_05_local_5_shard_00002591_processed.jsonl/32751
I am new to investing and opened a brokerage account through TD Ameritrade. I've been purchasing stock with cash deposited into the account. I noticed today the Maintenance requirement row in the balance sheet, and it made me wonder are they going to charge me for holding stocks? It says I am approved for margin, and 6 out of the 7 positions I hold are considered marginable. I've read the documentation on the site but man am I over my head on this stuff. I'm considering turning off margin approval on the account. I purchased all stocks in full with cash, so I do not understand what the maintenance requirement fees would be? And the maintenance requirement seems to be raising as the stocks go up in value? Will I be charged if the stocks go down in value? What are the risks? If I always purchase stocks in full with cash will I ever be charged a fee? My goal was to have a 0 commission account where I could purchase stocks and only lose money if the stocks depreciated in value. I do not want to deal with other fees and maintenance fees. There are no maintenance charges for buying stocks with cash. Because it's a margin account, it provides stats relevant to margin which you are not on. The info regarding 6 out of your 7 positions being marginable is just that, a stat, relevant to margin borrowing should you change your mind and opt to go that route. When you buy stocks on margin, there is an initial margin requirement (maximum of 50% in the US) and a minimum margin maintenance requirement of 25% (which increases as a stock appreciates). Brokers can require more. None of this is applicable to you if you are only buying for cash. | improve this answer | | Your Answer
global_05_local_5_shard_00002591_processed.jsonl/32774
Calculate your return on investment for your presence at Pollutec in December 2020 in Eurexpo Lyon in Lyon. has developed this ROI calculator so that you can calculate the best formula for your presence at the show. (version française)
global_05_local_5_shard_00002591_processed.jsonl/32796
Constitutional Hydrotherapy Health Benefits of Constitutional Hydrotherapy By altering blood and lymph flow, circulation and detoxification can be enhanced, while inflammation and pain are decreased. Immune system activity, particularly white blood cell count, increases. Improvements in digestive system function, sleep quality, energy level, and stress response are often reported. Cell function improves, which can have a healing effects anywhere in the body. Medicine has long recognized the the mechanical effects of [...] Trace Minerals: Essential for Health and Healthy Aging
global_05_local_5_shard_00002591_processed.jsonl/32804
Your Guide to Azure Cloud: Key Features and Benefits to Consider Jered Rassier, Senior Director of InnovationCloud Computing, Partners When it comes to the cloud, the facts are as clear as day: More businesses of all sizes are flocking to it, with plenty of choices to select from. By the millions, businesses of all types and sizes have moved their applications to the cloud. Whether it’s a private cloud from a local managed service provider, or a public cloud such as Microsoft Azure or Amazon Web Services, there are literally dozens of providers to choose from. The choice is ultimately yours as to where to go; the options are almost limitless. But as organizations of all types, including accounting firms, law practices, and healthcare clinics, are discovering for themselves, there is one choice that stands out from the rest: Microsoft Azure cloud services. What is the Microsoft Azure platform? When did it begin? How does it work? What makes it such a great cloud-based operating system? You’ve come to the right place for understanding what all the fuss is about and how to make the cloud work for your organization.  What is Microsoft Azure cloud? Launched originally in 2010, Microsoft Azure is one of the world’s most successful, expansive and comprehensive public cloud data centers on the market today. With well over 800 fully optimized services to select from — including Azure storage, data management, messaging, machine learning and Windows Virtual Desktop just to name a few — the capabilities are as far and wide as the clouds in the sky. Take Windows Virtual Desktop as just one example. As its description would suggest, this program uses the same format and user interface as Microsoft Windows 10, only delivered via the internet and the public cloud. With unified management in the Azure portal, Windows Virtual Desktop allows you to deploy and scale your Windows applications for remote use so your staff can connect from anywhere, whether it’s on their smartphone, laptop or tablet. At Netgain, Desktop-as-a-Service (DaaS) is one of our signature offerings, and we customize a solution to fit your specific needs. How does Azure cloud work? If you find it hard to explain how, exactly, the cloud works, don’t worry: You’re not alone. Several polls indicate that while most people have used the cloud at some point, they are unclear on the mechanics of it in terms of how the cloud itself works. Perhaps a better question to answer is how does Microsoft Azure work for you and your business in particular.  At the heart of the Azure cloud is virtualization. This technology is what makes the wide range of on-demand cloud based services possible. Once it is fully integrated with your network and computing system, you can use these services however you please and in accordance with your business’ demands, capabilities and practices. For example, one of the more practical core services found within Microsoft Azure is called Azure Compute. Here, users can create microservices, cloud applications that are fully scalable as well as application programs, or API. Since it’s cloud-based, Azure Compute allows you to seamlessly run all types of applications at once without having to deal with the logistics and setup that a hardwired server entails. From Azure Backup, Azure Storage and Azure Stack, this cloud platform allows you to work smarter, not harder. And since it’s scalable, you can decide how much or how little of the cloud you can leverage and how it’s integrated such as through a Platform as a Service (PaaS) approach or Infrastructure as a Service (IaaS). Netgain clients particularly appreciate Azure Backup because it makes it easy to keep offsite, versioned, long-term backups in the cloud with little effort. Azure’s robust cloud platform provides many services useful for our clients. For example, with Azure Application Gateway, clients that need to publish data or make applications available to the internet get protected external protection of their workloads, adding security, performance, and protection against distributed denial of service (DDoS) attacks. Even “smaller” capabilities that Microsoft Azure offers provide tremendous value, such as Azure Traffic Manager, which allows dynamic and quick response to changes and availability needs, allowing us to redirect a client’s traffic at will; and Express Route, which provides clients private connectivity to the cloud if they need it. Will your data be secure with Azure? Data security is a major issue that many Americans have encountered. An estimated 25% of people nationwide have been affected by cybercrime at some point, according to a 2018 Gallup poll. More recently, as the Identity Theft Resource Center discovered, around 540 data breaches were reported in the U.S. alone between Jan. 1 and June 30 of this year. While this total is down substantially from 2019, it nonetheless amounts to well over 165 million people that were adversely affected by a cyberattack in the first half of 2020. Part of the reason why so many people nowadays go to the cloud is the security for which it’s known. According to polling performed by Deloitte Insights, 58% of respondents said data protection was a leading rationale for migrating their data to the cloud, with 37% saying it was the single-biggest motivator. So, will your data be secure with Azure? Nothing is more important than trust, and as organizations like Audi, Carlsberg Group, Rackspace and Orica can attest, more businesses place their trust in Microsoft Azure and are all the better for it. That’s because Microsoft has more than 3,500 cybersecurity experts stationed around the globe that are committed to 100% data protection, leveraging the most reliable strategies and practices in the industry, including multifactor authentication, data encryption and adherence to external privacy standards established by organizations like Cloud Security Alliance, Content Delivery & Security Association and HITRUST. Spending roughly $1 billion on security research alone every year, Microsoft is fully invested in a security-first mentality—in more ways than one. At Netgain, we have an unyielding commitment to security and privacy and make it our mission to keep your data fully protected and defended at all times and in all facets. Where is data actually stored when using Microsoft Azure? Again, you have many options to select from but should you pick Microsoft Azure or a Microsoft partnering business like Netgain, you can rest assured that your data is in good hands. That’s because the Azure cloud keeps at least three copies of your data to ensure that your data is protected no matter what happens – from planned events like updates to unplanned ones like outages or failures. Netgain also takes advantage of Microsoft Azure’s global redundancy for backups and with our disaster recovery offering to keep you protected even against more widespread issues like a natural disaster. Just as virtualization is a key ingredient to cloud computing, redundancy is what allows your data to be immediately recoverable. Geo-redundancy guarantees that data is triple-replicated in not just one data center, it’s actually triple-replicated in two different data centers (six copies!) so if there is an outage in one region, it can still be recovered from another.  Learn more about business continuity and disaster recovery services in Azure from our webinar. Why choose Netgain? For more than 20 years, Netgain has been at the crossroads of all things IT, providing IT-as-a-Service (ITaaS) to CPA firms, law practices, and healthcare clinics. With Netgain’s Managed Services on Microsoft’s Azure Cloud, you get the highest levels of security, performance, flexibility, reliability, and scalability. Whether you work in healthcare, accounting, financial services, legal, or virtually any other field, our goal at Netgain is to help you build a better, more capable, and connected business by leveraging our capabilities. From cloud migration to business continuity, managed services to deploying, and managing your Office 365 based DaaS, Netgain is here for you, however, and wherever you need us. Request a consultation today to learn more about how we can support your business.
global_05_local_5_shard_00002591_processed.jsonl/32825
How to Communicate Your Expertise Without Sounding Arrogant Many of the most talented people are the worst at communicating their expertise. Here is a tool to make it easier. That's the question our team stumbled across as we did even more analysis into the data behind "the perfect contact page." That's why we created this guide. The Juxtaposition of Talent One glance at their portfolio and it's obvious that they're awesome at what they do, yet these same "insanely talented" companies are also the most likely to use the dangerously ineffective lines of "Please contact us" and/or "We hope to hear from you." It's easy to write this off as a case of the "shoemaker has no shoes" but as we were collecting our data we couldn't help but notice that the companies with less robust portfolios were better able to communicate their expertise. Needless to say, this juxtaposition is interesting because it points to the broken mental construct of "my work should speak for itself." Even if you're the best in the world at what you do, it doesn't matter unless you can communicate it effectively. (click to tweet) That is why I'm on a crusade against horribly ineffective contact forms. That's also why I've created the "Power Analogy" to help you more effectively communicate your message without resorting to silly animated line graphs which can never do your skills justice. The Power Analogy to the Rescue To help you communicate your expertise in a fun but human way, I've finally decided to talk about a little formula I've used for years called the Power Analogy. Essentially the Power Analogy is where you compare yourself to a celebrity or well known expert and use that "frame" to highlight your skills and abilities. It's a solid way for you to communicate your skills with confidence without being overly arrogant and saying, "You should hire me because I'm the best." Here is the Power Analogy used in the video: If Michael Jordan was a designer he'd be me. I'm a meticulously trained all-star who can help take your team to the championships. While I'm not a ball hog, I'm more than comfortable making your project a slam dunk through proactive problem-solving and goal-oriented design. So if you're ready to pass the ball to a seasoned yet coachable pro, use the project detail form below and we'll get the ball rolling. 1. Choose someone who matches your skill level. Comparing yourself to Lance Armstrong or Michael Phelps when you've only been in business for a year probably isn't a good idea. 2. Don't choose Kanye West or any other arrogant celebrity for your analogy. (Nothing can save you if you choose Kanye -- nothing.) 3. Don't take it too far. (You're on your own if you do) 5. Don't be "that guy" (or girl) who copies the Power Analogy in this post. Why this Technique Works The Power Analogy is effective because it communicates information based on a "mental map" or schema that your customer already has.[1] This allows you to build a very strong "mental picture" of the outcomes and benefits that your company delivers in a way that outperforms everything else I've seen. I look forward to seeing what you come up with. Always on your team, Nick ReeseNick Reese Signature Reference List: 1. Most of the books written on Schema or framing are pretty complex. Once again Wikipedia does a decent job of explaining it. ^
global_05_local_5_shard_00002591_processed.jsonl/32836
@article {2305, title = {Preliminary results of the first scientific drilling on Lake Baikal, Buguldeika site, southeastern Siberia}, journal = {Quaternary International}, volume = {37}, year = {1997}, note = {Vq100Times Cited:44 Cited References Count:29 }, month = {1997}, pages = {3-17}, abstract = {The Baikal Drilling Project (BDP) is a multinational effort to investigate the paleoclimatic history and tectonic evolution of the Baikal sedimentary basin during the Late Neogene. In March 1993 the Baikal drilling system was successfuly deployed from a barge frozen into position over a topographic high, termed the Buguldeika saddle, in the southern basin of Lake Baikal. The BDP-93 scientific team, made up of Russian, American and Japanese scientists, successfully recovered the first long (>100 m) hydraulic piston cores from two holes in 354 m of water. High quality cores of 98 m (Hole 1) and 102 m (Hole 2), representing sedimentation over the last 500,000 years, were collected in 78 mm diameter plastic liners with an average recovery of 72\% and 90\%, respectively. Magnetic susceptibility logging reveals an excellent hole-to-hole correlation. In this report the scientific team describes the preliminary analytical results from BDP-93 hole 1 cores. Radiocarbon dating by accelerator mass spectrometry provides an accurate chronology for the upper portion of Hole 1. Detailed lithologic characteristics, rock magnetic properties and inorganic element distributions show a significant change to the depositional environment occuring at 50 m subbottom depth, approximately 250,000 BP. This change may be due to uplift and rotation of the horst block in the Buguldeika saddle. The sedimentary section above 50 m is pelitic with varve-like laminae, whereas the section below 50 m contains a high proportion of sand and gravel horizons often organized into turbidite sequences. Accordingly, high resolution seismic records reveal a change in sonic velocity at this depth. It is inferred that sedimentation prior to 250 ka BP was from the west via the Buguldeika river system. After 250 ka BP the Buguldeika saddle reflects an increase in hemipelagic sediments admired with fine-grained material from the Selenga River drainage basin, east of Lake Baikal. Variations in the spore-pollen assemblage, diatoms, biogenic silica content, rock magnetic properties, clay mineralogy and organic carbon in the upper 50 m of BDP-93-1 reveal a detailed record of climate change over approximately the last 250,000 years. These variables alternate in a pattern characteristic of glacial/interglacial climatic fluctuations. The present age model suggests that the climate signal recorded in Lake Baikal sediments is similar to Late Quaternary signals recorded in Chinese loess sections and in marine sediments. Copyright (C) 1996 INQUA/Elsevier Science Ltd}, keywords = {asia, tectonics}, isbn = {1040-6182}, author = {Colman, S. and Grachev, M. and Hearn, P. and Horie, S. and Kawai, T. and Kuzmin, M. and Logachov, N. and Fialkov, V. and Gorigljad, A. and Tomilov, B. and Khakhaev, B. and Kochikov, S. and Lykov, V. and Pevzner, L. and Bucharov, A. and Karabanov, E. and Logachev, N. and Mats, V. and Bardardinov, A. and Baranova, E. and Khlystov, O. and Khrachenko, V. and Shimaraeva, M. and Stolbova, E. and Komakova, E. and Efremova, S. and Gvozdkov, A. and Kravchinski, V. and Peck, J. and Fileva, T. and Kashik, S. and Khramtsova, T. and Kalashnikova, I. and Rasskazova, T. and Tatarnikova, V. and Yuretich, R. and Mazilov, V. and Takemura, K. and Bobrov, V. and Gunicheva, T. and Haraguchi, H. and Ito, S. and Kocho, T. and Kuzmin, M. and Markova, M. and Pampura, V. and Proidakova, O. and Ishiwatari, R. and Sawatari, H. and Takeuchi, A. and Toyoda, K. and Vorobieva, S. and Ikeda, A. and Marui, A. and Nakamura, T. and Ogura, K. and Ohta, T. and King, J. and Sakai, H. and Yokoyama, T. and Hayashida, A. and Bezrukova, E. and Fowell, S. and Fuji, N. and Letunova, P. and Misharina, V. and Miyoshi, N. and Chernyaeva, G. and Ignatova, I. and Likhoshvai, E. and Stoermer, E. and Granina, L. and Levina, O. and Dolgikh, P. and Lazo, F. and Lutskaia, N. and Orem, W. and Wada, E. and Williams, D. and Yamada, K. and Yamada, S. and Callander, E. and Golobokoval, L. and Shanks, P. and Dorofeeva, R. and Duchkov, A.} }
global_05_local_5_shard_00002591_processed.jsonl/32850
Malcolm Jamal Warner on Cosby Scandal in Comparison to Woody Allen/Polanski/Stephen Collins -Admits he doesn't want the Cosby show to be pulled off the air because, "It’s literally taking money out of my pocket. So I got my own personal feelings about that, because it personally affects me.”
global_05_local_5_shard_00002591_processed.jsonl/32857
Blind Side by Jennie Ensor Then London is attacked… When I received my copy of Blind Side, on the face of it I was expecting a fairly standard suspense / thriller – right up my street, don’t get me wrong, but likely similar to a lot of books I have read before and probably will again.  I am pleased to say I was pleasantly surprised because the book is much more complex that I expected or than it first seemed. It opens with Georgie and her best friend Julian sharing one too many glasses of wine that see them ending up in bed together.  Waking up and hungover Georgie knows it’s not the best idea she has ever had but the situation is made worse when Julian tells her that he loves her, has always loved her, and wants a relationship.  This is the last thing Georgie wants.  Julian, though, doesn’t and won’t take no for an answer, becoming increasingly possessive the more Georgie moves away from him. Then Georgie meets Nikolai, a Russian in London illegally and with a dark past, one he is either hiding because he is up to no good or because he is too ashamed to tell the truth.  For a long time, almost to the end, it isn’t clear what his motives are.  A career-minded woman, normally Georgie wouldn’t look at someone like Nikki but she finds herself drawn to him despite the secrets he is keeping.  As their relationship develops, Julian’s obsession becomes worse and he will – it seems – stop at nothing to stop them falling in love. What sets this book apart is the setting – the story takes place in London in 2005 in the run up too and aftermath of 7/7.  Tensions are high and distrust is in the air.  Nikolai has links to Chechnya which are hard for Georgia to ignore.  Whilst I wasn’t in London during this time, the descriptions of how people felt, their anxiety and constant looking over their shoulder and suspecting people felt very real to me. I think the setting also helped develop the characters.  Not so much Julian, but Georgia was well-rounded and relatable whilst Nikolai’s discomfort at being a stranger in a strange land came across well.  It helped explain a lot of their misunderstandings, which meant plenty of twists and turns in the plot and a constant second-guessing of motives.  If I had any criticisms it would be the length – always a personal thing – but for me it was a little too long.  However, this is minor and didn’t stop me liking the book a lot. Note: I received a copy of this book from the author Jennie Ensor in return for a fair and honest review.  All thoughts, feelings and opinions are my own.  Many thanks for my copy Jennie. 11 thoughts on “Blind Side by Jennie Ensor Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/32862
Open Government Program All Resources 1 result found Language: Spanish Tags: abused men intimate relationships interpersonal attraction interpersonal conflicts family relationships Publication Type: Fact Sheet Audience: Seniors Children Information Type: publications Organizations: Community and Social Services Views: 117 November 1, 2018
global_05_local_5_shard_00002591_processed.jsonl/32863
I’ve Got the Keys By Robine Jean-Pierre Reviving Grammar: A Summary of the Eight Parts of Speech By Robine Jean-Pierre Many of my peers would agree that we rarely studied grammar throughout most of our years of primary education. Grammar was a ghost that introduced itself somewhere between kindergarten and third grade, only to never be seen again–and yet our teachers would expect us to remember all that it entailed through high school, and maybe even into college. My eighth grade English teacher, Mr. Snyder, took it upon himself to teach us all that we had missed out on, knowing that our previous teachers had done us a disservice. Before we got into building our vocabulary and writing analytical essays, we started with the basic building blocks: parts of speech. To help visual, synesthetic learners like me, he associated colors and shapes with each one. I will walk you through what I remember from his class. I always knew a noun to be a person, place or thing, but it wasn’t until this class that a fourth option was added to this iconic phrase: a person, place, thing or idea (also known as an abstract thought). Our teacher circled nouns in red marker. In a sentence like “Joe tried to hide his disappointment as he waited on a bench in the park,” Joe is a person, the park is a place, the bench is a thing and disappointment is an idea; these are all examples of nouns. When it’s not so obvious, you can generally identify something as a noun if you can count it, if you can put “a/an” or “the” in front of it (these are called articles), or if it ends in something like -tion, -ness, or -ity, for example, action, sadness, and unity. These take the place of nouns. Imagine how clunky and awkward it would be if every time you talked about someone, you had to use that person’s name: “Angel said Angel is on Angel’s way, so wait up for Angel.” This next sentence is a lot more concise: “Angel said he is on his way, so wait up for him.” He, his, and him are all pronouns which are replacing, and referring to, Angel. We have a good number of pronouns in English: I, me, my, mine, myself; you, your, yours, yourself; he, him, his, himself; she, her, hers, herself; it, itself; one, oneself; we, us, our, ourselves; they, them, their, theirs, themselves; this, that, these, those. This may sound like a lot to remember, but we use them all the time without even realizing it. Next are verbs, which Mr. Snyder underlined in green. Verbs are usually referred to as action words, such as “eat,” “sleep,” and “breathe.” Since something or someone (the subject) has to perform the action, verbs tend to follow right after nouns. If you have ever taken a foreign language class, you have had to learn all about verb conjugations; depending on the subject, some changes would be made to the verb. In English, the change is simple for regular verbs: just add -s at the end if the subject uses the pronoun he, she, it or one (i.e. second person singular). For example: I jump, you jump, he jumps, etc. Our most irregular but most common verb, “to be,” does not follow this pattern at all: I am, you are, he/she/it/one is, we are, they are. (This holds true in many Latin-based languages like French and Spanish.) These words, which he boxed in purple, describe nouns, giving you more information about them. If your friend is telling you about a new crush, the conversation will be oozing with adjectives: she’s so smart, funny, talented; he’s handsome, dreamy, confident. Adjectives include colors, numbers, size, quality, and other attributes. You might find these anywhere in a sentence but they can also come directly before the noun they belong to: the cool breeze or the delicious pizza.   Our teacher made an orange triangle around these. Whereas adjectives describe or modify nouns, adverbs modify verbs. They tend to answer the question  “how?” and they often end in -ly. In the sentence “She entered timidly, quickly taking a seat by the door,” timidly and quickly are the adverbs, and they are describing the way she entered and the way she took a seat. Other adverbs not ending in -ly include often, just, much, and so. We use these all the time, if you haven’t noticed. I don’t remember the color coding for the next three, and they are also not as frequently talked about, but they are good to know: These include some of the smallest, most frequently used words in our language: to, at, in, on, by, for, out, from, etc. Longer ones include under, between, through, and alongside. Their name, made up of “pre-” and “position,” give a hint as to how they are used: they tend to indicate direction or placement, and can easily answer the question “where?” when grouped with a noun: “I’m at the park on West 4th street by the pizzeria.”  These connect words or parts of sentences to each other. They include and, or, but, because, whereas. Conjunctions establish a relationship between two or more elements. Or tells you that one out of several options is to be selected, not all of them: “Either I will be babysitting that night or doing my homework.”Another example: “You can only choose one color: red, green, or blue.” And may indicate that several things have something in common: “Nick, Joe and Kevin have black hair.” But tends to highlight a contrast: “It’s raining outside but I don’t have my umbrella.” Because has the word cause in it, and indeed links two clauses to create a cause-and-effect relationship. “I didn’t knock because I thought you were sleeping.” These words express emotion and for this reason tend to be exclaimed, for example: “Wow!” “Whoa!” “Gee whiz!” “Ouch!” It is interesting to note how these change from generation to generation within the same language (no one really says “gee whiz” anymore, unless it’s with a touch of sarcasm), and also vary from culture to culture. I hope you found this helpful in learning (or relearning) the eight parts of speech, and that it wasn’t too difficult to follow. We shouldn’t take English for granted just because it’s our native language. The better we understand it, the better we can communicate. Pros and Cons of Blogging For help with your blog, advertising, or more email me at amonib.biz@gmail.com Victory, The Victorious a man on a tv screen a man in sunglasses and a T-shirt I wish him good luck on all endeavers. Getting Paid From Your Following a young woman of color with shoulder-length, wavy hair Here I explain HOW TO GO VIRAL: NEXT: Get A Steady Income ONLINE Timing is Everything – 5 Steps To Be On Time 5 Steps to Start A Business  7 Steps to Run a Marathon  8 Steps Towards a Happy Life A Charitable Winter As an afterschool teacher, I taught my 4:5th grade students to importance of generosity, empathy, and thankfulness during the fall and winter months.  Although it is a struggle to get them to learn tolerance and that there are various forms of bullying to withhold from, they seen to be getting the charitable concept. We will be doing a play, written and directed by me, this week on 18th of December to show the thankfulness and charity of the holiday season. I will edit this blog to add images of the performance. Here are some images leading up to this point, as far as prep and learning concepts. Share what you are doing that’s charitable this winter. And check out Vive Entertainment Enterprises @vive_ent they are hosting a homeless clothing drive. Hope to see you guys next semester. Anything You Want OR Need … for FREE!! colored letters that spell "FREE" Here’s How: 9. Business Help: Organizations like SBDC at New York City College of Technology, Small Business Association, NYC Business Solutions, NELP (lawyers), and government websites will help small business and entrepreneurs. Go on sites like idealist.org or businessmentor.org to find volunteers and help. The best thing to do is network. Your Network Determines Your Net Worth cans of Chillo drink Hemp Energy Drinks by AudioVision via CC* License  Such as … cartoon images of blue stick-figure men 3D Social Networking by Chris Potter via CC License a woman in a white dress holding out her hand Helping Hand Edited by Stormgirl via CC license people in suits shaking hands Business Meeting by thetaxxhaven via CC license  a word cloud of business terms Business by Gerald via CC license *CC: Creative Common
global_05_local_5_shard_00002591_processed.jsonl/32870
Jump to content • Content Count • Joined • Last visited Community Reputation 0 Neutral About dr_jacky_2005 • Rank Private First Class 1. First and second items was IOService. Mr.Hyde’s Mac Pro.zip 2. Honestly, i don't know what are these and what should i do?! http://www.rampagedev.com/?page_id=82&page=5 I extracted DSDT.aml with DSDT Editor and now, what should i do?! Do you wanna see my Device DSDT.aml? 3. No problem, but what can i do now?! Is there any tricks, kext,... i don't know, should i continue with this situation?! Inserted charger cable and works!? 4. I boot into mac with GraphicsEnabler=Yes -v -f boot flags, and it's a little speedy, but i could see these: Failed to load kext com.apple.AMDRadeonX4000 Failed to load kext com.apple.iokit.IOHDAFamily Failed to load kext com.apple.AppleHDAContorller And now get stuck in [iOBluetoothHCIController::setConfigState] Calling registerService. Although when i can boot with GraphicsEnabler=No, i can use bluetooth device and connect to devices! 5. How to check/setup suitable CPU power management?! Is that on Mac OS side?! 6. Hi, I have a ML 10.8.3, with device specification in signature. My battery in normal situation keep on laptop about 3h. But in ML, if i don't put charger cable into device, less than 30m. 7. Hi, I have a ML 10.8.3, with device specification in signature. This is my org.chameleon.Boot.plist: This is system report: How can increase graphics memory, defined whole my graphic card? 8. Problem solved. Thank you so much Hervé. i didn't remove SmartTouchPad, but install usb 3 legacy and some other stuff, and now my wired USB mouse working. And in Trackpad, in System Preferences, double click problem solved. And now i have some other problems like Audio and network and ONLY 3MB Graphics memory, that should search more and even make e new topic for them. Thanks. 9. I got a quote from Elan developer, that how install Ok, thank you for your detailed explanation. I installed SmartTouchPad kext and problem solved pretty much; Wired USB mouse does not work, but trackpad worked, but double touch on pad does not acted, and i should click hard buttons for right and left click. (i readed somewhere that double click has a config in mac os x to enable it, b I'll install Elan kext. let's see what's happening... 10. I don't get it! "them" means which ones and placed them where?! First remove AppleACPIPS2Nub.kext and ApplePS2Controller.kext from /System/Library/Extensions & /Extra/Extensions & /System/Extensions/Library/myHack.kext/Contents/Plugins/ , then put Elan.kext into /Extra/Extensions/ , then run myHack-myFix(quick) ? Is that right? By the way, before doing above steps, and with previous AppleACPIPS2Nub.kext and ApplePS2Controller.kext, when i using -f -v USBBusFix=Yes boot flags, it get stuck in: (my point is more about above lines, not bluetooth error, yet) : 11. AppleACPIPS2Nub.kext and ApplePS2Controller.kext that were in myHack USB/Extra/Extensions/ path, are in Mac Partition/Extra/Extensions/ path, before. So what can i do now?! What's your opinion about removing these kext and install Elan Touch Pad Kext 3.8.5 OR SmartTouchPad_v4.2_Final ? If you say yes, should i remove those from this paths? /System/Library/Extensions /Extra/Extensions /System/Extensions/Library/myHack.kext/Contents/Plugins/ And another question: Why number of kext in myHack USb/Extra/Extensions is not equal and more than number of kext that are in Mac Partition/Extra/Extensions ? 12. This is my machine specification: System: Asus N56DP UltraBook (Chameleon) CPU: AMD A10-4600M 2.3Ghz Graphics: AMD Radeon HD 7660G + HD 7730M Dual Graphics, 1366x768 I installed Mountain Lion 10.8.3 on a MBR partition via myHack 3.3.1, using GraphicsEnabler=No boot flag, with patched amd kernel (mach_10.8.3_fixed_rc4), with installing Generic Extra,Chameleon and removing 3 kexts that recommended by myHack { 1) " ApplePolicyControl.kext " Causes Kernel Panic on many systems Unless on non apple computer. Strongly Recommended Remove It. 2) " AppleTyMCEDriver.kext " Causes KP on system identified as Mac Pro 4,1 or 5,1 in smbios.plist. Recommended that you Remove It. 3) " AppleUpstreamUserClient.kext " Causes Extremely Sluggish mouse and User Interface on many systems with NVIDIA Gfx . It is strongly Recommended that U remove this Kext. } I used another amd kernels too but they didn't work for me; like: AMD FX Kernel 10.8.x AMD Kernel 10.8.x Bronya_10.8_kernel_RC5 I have installed Windows 7 with Paragorn HFS+, so i can see and copy/paste in Mac partition. After OS X installation completed, i logged in windows 7 and copy used amd kernel into Mac partition, then restart and log in OS X with -v -f GraphicsEnabler=No boot flag, and now i can see Welcome and choose language screen , But my usb mouse and trackpad does not worked! But during installation os x, my mouse worked, but trackpad does not. Should i install used kexts before boot into Mac Os X?! (via boot into myHack USB and using terminal and some command stuff that i don't know exactly) 13. I don't know what is Combo Update and how to do that, but thank you for your recommend. For kext installation, is it possible to copy kext folder and paste it on Mac partition/System/Library/Extensions/ ? ( All of these works in windows 7, cause i installed Paragorn HFS+ and can see HFS partitions ) 14. Ok, so just -v -f GraphicsEnabler=No seems needed. I think so; after myHack process on USB ended, i saw AppleACPIPS2Nub.kext & ApplePS2Controller.kext in it's Extra folder. But if you want i can double check it with boot to myHack USB and go to terminal and list all kext that are in /System/Library/Extensions/ • Create New...
global_05_local_5_shard_00002591_processed.jsonl/32872
Explanation of your search queryX Search Mode: Before/After (because search uses "BEFORE:"/"AFTER:") - finds files that aired before/after a specific file Sort Mode: only by format +2020-10-16Date +20:15Time +PRO7MAXXTerm Search took: 10.72ms Result: 3 otrkey-files found. Tell us what you like, or dislike:
global_05_local_5_shard_00002591_processed.jsonl/32898
Refer a friend and you could each earn up to $250 Introducing Pepperstone’s unique referral program A friend of yours is a friend of ours. That's why when you refer a friend who goes on to fund and trade with us, you'll both be rewarded with cash - not credit. The more friends you successfully refer, the more cash you both stand to earn. There’s no limit to how many friends you refer. Start earning in 3 steps 1. Invite your friend to trade with us 2. Ask your friend to state your email address in the Referred By section under Trading Preferences in their live account application. 3. Once your friend funds and trades with us, we’ll reward you both with the cash deposits How it works Your friend deposits (AUD) Your friend trades You’ll each receive (AUD) 5 lots 20 lots If you'd like to know more, see our Terms and Conditions or get in touch.
global_05_local_5_shard_00002591_processed.jsonl/32901
=over =item last LABEL X X =item last EXPR =item last The L|/last LABEL> command is like the C statement in C (as used in loops); it immediately exits the loop in question. If the LABEL is omitted, the command refers to the innermost enclosing loop. The C form, available starting in Perl 5.18.0, allows a label name to be computed at run time, and is otherwise identical to C. The L|/continue BLOCK> block, if any, is not executed: LINE: while () { last LINE if /^$/; # exit when done with header #... } L|/last LABEL> cannot return a value from a block that typically returns a value, such as C, C, or C. It will perform its flow control behavior, which precludes any return value. It should not be used to exit a L|/grep BLOCK LIST> or L|/map BLOCK LIST> operation. Note that a block by itself is semantically identical to a loop that executes once. Thus L|/last LABEL> can be used to effect an early exit out of such a block. See also L|/continue BLOCK> for an illustration of how L|/last LABEL>, L|/next LABEL>, and L|/redo LABEL> work. Unlike most named operators, this has the same precedence as assignment. It is also exempt from the looks-like-a-function rule, so C will cause "bar" to be part of the argument to L|/last LABEL>. =back
global_05_local_5_shard_00002591_processed.jsonl/32905
Vīra Śaivism: History and Literature History and Literature of Vīra Śaivism. The name “Vīra śaiva” as applied to a particular Śaiva sect appears to be of a late date. Mādhava in his Sarva-darśana-saṁgraha of the 14th century A.D., who mentions the Pāśupatas and the Āgamic Śaivas, does not seem to know anything about the Vīra- śaivas. Śankara and Vācaspati and Ānandagiri of the eighth and the ninth centuries do not seem to know anything of the Vīra- śaivas. Neither are they alluded to in any of the Śivāgamas. The Vātula-tantra seems to have two editions (in manuscript), and in one of them the ṣaṭ-sthala doctrine is mentioned in the form of an appendix, which shows that this introduction was of the nature of an apocryphal. The doctrine of linga-dhāraṇa in the manner in which it is done by the Liṅgāyats of the Vīra-śaivas can hardly be traced in any early works, though later Vīra-śaiva writers like Śrīpati and others have twisted some of the older texts which allude to linga to mean the specific practices of linga-dhāraṇa as done by the Liṅgāyats. From his native place Bāgevaḍi, he went to Kalyan near Bombay, at a comparatively young age, when Vijjala was reigning there as king (A.D.1157-67). His maternal uncle Baladeva having resigned on account of illness, Basava was appointed as the minister in complete charge of Vijjala’s treasury and other administrative functions. According to another tradition Basava succeeded in deciphering an inscription which disclosed some hidden treasure, and at this, King Vijjala was so pleased that he gave Basava the office of prime minister. According to the Basava-Purāṇa, which narrates the life of Basava in a mythical Purāṇic manner, Basava, on assuming the office, began to distribute gifts to all those who professed themselves to be the devotees of Śiva. This led to much confusion and heart-burning among the other sects, and it so happened that King Vijjala cruelly punished two of the devotees of Śiva. At this, by the instigation of Basava, one of his followers murdered Vijjala. Bhandarkar gives some other details, which the present writer has not been able to trace in the Basava-Purāṇa (the source, according to Bhandarkar himself). The Basava-Purāṇa was written after the time of Śrīpati Pandita. It is said there that at one time Nārada reported to Śiva that, while other religions were flourishing, the Śaiva faith was with few exceptions dying out among the Brahmins, and so it was decaying among other castes also. Lord Śiva then asked Nandi to get himself incarnated for taking the Vīra-śaiva faith in consonance with the Varṇāśrama rites. If this remark is of any value, it has to be admitted that even after the time of Śrīpati Pandita the Vīra- śaiva faith had not assumed any importance in the Carnatic region. It also indicates that the Vīra-śaiva faith at this time was not intended to be preached in opposition to the Hindu system of castes and caste duties. It has been contended that Basava intro­duced social reforms for the removal of castes and caste duties and some other Hindu customs. But this claim cannot be substantiated, as, in most of the Vīra-śaiva works, we find a loyalty to the Hindu caste order. There is, of course, a tendency to create a brotherhood among the followers of Śiva who grouped round Basava, as he was both politically and financially a patron of the followers of Śiva. The Basava-Purāṇa also says that Basava was taken before the assembly of pandits for the performance of the rite of initiation of the holy thread at the age of eight, according to the custom of compulsory initiation among the Brahmins. Basava, however, at that early age protested against the rite of initiation, on the grounds that the holy thread could purify neither the soul nor body, and that there were many instances in the purāṇic accounts where saints of the highest reputation had not taken the holy thread. We find no account of Basava as preaching a crusade against Hindu customs and manners, or against Brahmanism as such. Basava’s own writings are in Canarese, in the form of sayings or aphorisms, such as is common among the devotees of other sects of Śaivism, Vaiṣṇavism, etc. It can be said that they contain a rapturous enthusiasm for the God Śiva, who to Basava appeared as the Lord Kudala Sagama. These sayings referred to Śiva as the supreme Lord, and to Basava himself as his servant or slave. They also contain here and there some biographical allusions which cannot be reconstructed satisfactorily without the help of other contemporary evidence. So far as can be judged from the sayings of Basava, it is not possible to give any definite account of Vīra-śaiva thought as having been propounded or systematised by Basava. According to Basava-Purāṇa, the practice of linga- dhāraṇa seems to have been in vogue even before Basava. Basava himself does not say anything about the doctrine of ṣaṭ-sthala, and these two are the indispensably necessary items by which Vīra- Śaivism can be sharply distinguished from the other forms of Śaivism, apart from its philosophical peculiarity. On this also Basava does not seem to indicate any definite line of thought which could be systematised without supplementing it or reconstructing it by the ideas of later Vīra-śaiva writers. Though the kernel of the Vīra-śaiva philosophy may be traced back to the early centuries of the Christian era, and though we find it current in works like Sūta-samhitā of the sixth century A.D., yet we do not know how the name Vīra-śaiva came to be given to this type of thought. In the work Siddhānta- śikhāmai, written by Revaṇācārya some time between Basava and Śrīpati, we find the name “Vīra-śaiva “ associated with the doctrine of sthala, and this is probably the earliest use of the term in available literature. Siddhānta- śikhāmaṇi refers to Basava and is itself referred to by Śrīpati. This shows that the book must have been written between the dates of Basava and Śrīpati. The Siddhānta śikhāmaṇi gives a fanciful interpretation of the word, ‘Vīra’ as being composed of ‘vi’ meaning knowledge of identity with Brahman, and ‘ra’ as meaning someone who takes pleasure in such knowledge. But such an etymology, accepting it to be correct, would give the form ‘Vira’ and not ‘Vīra.’ No explanation is given as to how ‘vi’ standing for ‘vidyā,’ would lengthen its vowel into ‘vī.’ Therefore it is difficult to accept this etymological interpretation as justifying the application of the word ‘Vira’ to Vīra-śaiva. Moreover, most systems of Vedāntic thought could be called Vīra in such an inter­pretation, for most types of Vedanta would feel enjoyment and bliss in true knowledge of identity. The word “Vīra” would thus not be a distinctive mark by which we could distinguish Vīra-śaivas from the adherents of other religions. Most of the Āgamic Śaivas also would believe in the ultimate identity of individuals with Brahman or Śiva. Therefore we can imagine that Vīra-śaivas were called Vīras or heroes for their heroic attitude in an aggressive or defensive manner in support of their faith. We have at least two instances of religious persecution in the Śaiva context. Thus the Chola King Koluttunga I, a Śaiva, put out the eyes of Mahāpūrṇa and Kureśa, the Vaiṣṇava disciples of Rāmānuja, who refused to be converted to Śaivism. The same sort of story comes in the life of Basava where the eyes of two of his disciples were put out by Vijjala, and Vijjala got himself murdered by Basava’s followers. These are but few instances where violence was resorted to for the spread of any religion, or as actions of religious vengeance. We can suppose that the militant attitude of some Śaivas, who defied the caste rules and customs and were enthu­siasts for the Śaiva faith, gave them the name of Vīra-śaiva or Heroic Śaiva. Even the Siddhānta-śikhāmaṇi refers to the view of Basava that those who decried Śiva should be killed. Such a militant attitude in the cause of religion is rarely to be found in the case of other religions or religious sects. In the above context Siddhānta-śikhāmaṇi points out in the ninth chapter that, though Vīra-śaivas are prohibited from partaking in the offerings made to a fixed phallic symbol sthāvara-liga, yet if there is a threat to destroy or disturb such a symbol, a Vīra-śaiva should risk his life in preventing the aggression by violent means. So far our examination has not proved very fruitful in dis­covering the actual contribution to Vīra-śaiva philosophy or thought, or even the practice of a-sthala and linga-dhāraṇa, made by Basava. He must have imparted a good deal of emotional enthusiasm to inspire the Śaivas of different types who came into contact with him, either through religious fervour or for his financial and other kinds of patronage. It seems from the Basava- Purāṇa that his financial assistance to the devotees of Śiva was of rather an indiscriminate character. His money was poured on all Śaivas like showers of rain. This probably made him the most powerful patron of the Śaivas of that time, with the choicest of whom he founded a learned assembly where religious problems were discussed in a living manner, and he himself presided over the meetings. It is considered that the kernel of Vīra-śaiva thought is almost as early as the Upaniṣads, and it may be found in a more or less systematic manner by way of suggestion in the writings of Kālidāsa who lived in the early centuries of the Christian era. The Sūta samhitā, a part of the Skanda-Purāṇa, seems to teach a philosophy which may be interpreted as being of the same type as the Vīra-śaiva philosophy propounded by Śrīpati, though the commentator interprets it in accordance with the philosophy of Śankara. The Sūta samhitā gives a high place to the Āgama literature such as the Kāmika, and others, which shows that it was closely related with the Āgamic Śaivism. But it is difficult to say at what time the Vīra-śaiva sect was formed and when it had this special designation. Vīra-Śaivism differs from the Āgamic Śaivism and the Pāśupata system in its philosophy and its doctrine of sthala, the special kind of linga- dhāraṇa and also in some other ritualistic matters which are not quite relevant for treatment in a work like the present one. It is unfortunate that Siddhānta-śikhāmaṇi, a work probably of the thirteenth century, should contain the earliest reference to Vīra- Śaivism in literature. A small manuscript called Vīra-śaiva-guru- paramparā gives the names of the following teachers in order of priority: (1) Viśveśvara-guru, (2) Ekorāma, (3) Vīreśārādhya, (4) Vīra-bhadra, (5) Vīraṇārādhya, (6) Māṇikyārādhya, (7) Buccay-yārādhya, (8) Vīra-malleśvarārādhya, (9) Deśikāradhya, (10) Vṛṣabha, (11) Akṣaka and (12) Mukha-liṅgeśvara. In the Vīra- śaivāgama, eighth paala, it is said that in the four pīṭhas or pontifical seats, namely yoga-pīṭha, mahā-pīṭha, jñāna-pīṭha and soma-pīṭha, there were four teachers of different priority: Revaṇa, Manila, Vāmadeva, and Paṇḍitārādhya. These names are of a mythical nature, as they are said to be referred to in the different Vedas. But the names that we have quoted above from the Vīra- śaiva-guru-paramparā form a succession list of teachers up to the time of the teacher of the author of the manuscript. On studying the succession list of teachers, we find that we know nothing of them either by allusion or by any text ascribed to them, excepting Vīra-bhadra, who has been referred to in the Siddhānta-śikhāmaṇi. We cannot say how much earlier Vīra-bhadra was than the author of the Siddhānta-śikhāmaṇi. But since Vīra-bhadra is mentioned along with Basava in the same context, we may suppose that this Vīra-bhadra could not have been much earlier than Basava. So if we are safe in supposing that Vīra-bhadra lived somewhere in the twelfth century, we have only to compute the time of the three Ācāryas who lived before Vīra-bhadra. According to ordinary methods of computation we can put a hundred years for the teaching period of the three teachers. This would mean that Vīra- Śaivism as a sect started in the eleventh century. It is possible that these teachers wrote or preached in the Dravidian tongue which could be understood by the people among whom they preached. This would explain why no Sanskrit books are found ascribed to them. Basava was probably one of the most intelligent and emotional thinkers, who expressed his effusions in the Kāunāḍa language. But about our specification of the succession list of Vīra-śaiva teachers much remains yet to be said. It does not explain any­thing about the other lines of teachers, of whom we hear from stray allusions: Thus we hear of Agastya as being the first pro­pounder of the Śaiva faith. We find also that one Reukācārya wrote the work Siddhānta-śikhāmaṇi based upon the verdict of other Vīra-śaiva works and giving us the purport of the mythical dialogue that took place between Reṇuka-siddha and Agastya some time in the past. The Reṇuka-siddha was also called Revaṇa- siddha, and it is supposed that he expounded the Vīra-śaiva Śāstra to Agastya in the beginning of the Kali age. We find at a much later date one Siddha-rāmeśvara, who was impregnated with the doctrine of Vīra-Śaivism; it is in his school of thought that we have a person called Śiva-yogīśvara, who gives us the supposed purport of the dialogue between Raṇuka and Agastya, as it had traditionally come down to him, supplementing it with the teachings of other relevant literature. In the family of Siddha- rāmeśvara there was born one Mudda-deva, a great teacher. He had a son called Siddha-nātha, who wrote a work called Śiva- siddhānta-niraya containing the purport of the Āgamas. The other teachers of the time regarded him as the most prominent of the Vīra-śaiva teachers (Vīra-śaiva-śikhā-ratna) and Reṇukācārya, who called himself also Śiva-yogin, wrote the work, Siddhānta- śikhāmaṇi. We thus see that there was a long list of Vīra-śaiva teachers before Reṇukācārya, who probably lived somewhere in the thirteenth century. Even if we do not take this into account, Reṇukācārya, the author of Siddhānta-śikhāmaṇi says that he had written the work for the elucidation of the nature of Śiva by consulting the Śaiva Tantras beginning from the Kāmikāgama to the Vātulāgama and also the Purāṇas. He further says that the Vīra-śaiva Tantra is the last of the Śaiva Tantras and therefore it is the essence of them all. But what is exactly the content of the Vīra-śaiva philosophy as explained in the Siddhānta-śikhāmaṇi? It is said that Brahman is the identity of ‘being,’ ‘bliss’ and ‘consciousness,’ and devoid of any form or differentiation. It is limitless and beyond all ways of knowledge. It is self-luminous and absolutely without any obstruction of knowledge, passion or power. It is in Him that the whole world of the conscious and the unconscious remains, in a potential form untraceable by any of our senses, and it is from Him that the whole world becomes expressed or manifest of itself, with­out the operation of any other instrument. It implies that when it so pleases God, He expands Himself out of His own joy, and there­by the world appears, just as solid butter expands itself into its liquid state. The qualities of Śiva are of a transcendent nature (aprākta). The character of being, consciousness and bliss is power (śakti). It is curious, however, to note that side by side with this purely ultra-monistic and impersonal view we find God Śiva as being endowed with will by which He creates and destroys the world. As we shall have occasion to notice later on, the whole doctrine of ṣaṭ-sthala, which forms the crux of Vīra-śaiva thought, is only an emphasis on the necessity on the part of every individual to look upon him and the world as being sustained in God and being completely identified with God. There are, indeed, many phrases which suggest a sort of bhedābheda view, but this bhedābheda or difference in unity is not of the nature of the tree and its flowers and fruits, as such a view will suggest a modification or trans­formation of the nature of Śiva. The idea of bhedābheda is to be interpreted with the notion that God, who is transcendent, appears also in the form of the objects that we perceive and also of the nature of our own selves. The Siddhānta-śikhāmaṇi was based on the Āgamas and there­fore had the oscillating nature of philosophical outlook as we find in the different Āgamas. Thus in Siddhānta-śikhāmaṇi, ch. v, verse 34, it is said that the Brahman is without any form or quality, but it appears to be the individual souls (jīvas) by its beginningless association with avidya or nescience. In that sense jīva or the individual soul is only a part of God. Siddhānta-śikhāmaṇi further says that God is the controller, the mover (preraka) of all living beings. In another verse it says that Brahman is both God and the souls of beings at the same time. In pure Śiva there are no qualities as sattva, rajas and tamas. Again Siddhānta-śikhāmaṇi oscillates to the Vedanta view that the individual souls, the objects of the world as well as the Supreme Controller, are all but illusory imposition on the pure consciousness or Brahman. The Siddhānta-śikhāmaṇi admits both avidya and māyā after the fashion of Śaṅkarites: It is in association with avidya that we have the various kinds of souls and it is with the association of māyā that Brahman appears as omniscient and omnipotent. It is on account of the avidya that the individual soul cannot realise its identity with Brahman, and thus goes through the cycle of births and rebirths. Yet there is another point to note. In the Yoga-sūtra of Patañjali, it is said that the nature of our birth, the period of life and the nature of our experiences, are determined by our karma, and that the law of the distribution of the fruits of karma is mysterious. But the effects of karma take place automatically. This view is only modified by the Pāśupatas and the Naiyāyikas who belong to their fold. It is interesting to notice that the Siddhānta- śikhāmaṇi borrows this idea of karma from the Pāśupatas, who hold that the distribution of karma is managed and controlled by God. Siddhānta- śikhāmaṇi thus seems to present before us an eclectic type of thought which is unstable and still in the state of formation: This explains the author’s ill-digested assimilation of elements of thought on Pāśupata doctrine, the varying Āgama doctrines, the influence of Sāṁkhya, and ultimately the Vedanta of the Śaṅkarites. This being so, in the thirteenth century we cannot expect a systematic Vīra-śaiva philosophy in its own individual character as a philosophical system in the time of Basava. It will be easy for us to show that Allama-prabhu, the teacher of Basava, was thoroughly surcharged with the Vedantism of the Śankara school. In the Śankara-vijayaĀnandagiri, a junior contemporary and a pupil of Śankara gives a long description of the various types of the devotees of Śiva who could be distinguished from one another by their outward marks. Śankara himself only speaks of the Pāśupatas and the Śaivas who followed the Siddhāntas or the Āgamas, in which God Śiva has been described as being the instrumental cause, different from the material cause out of which the world has been made. Vācaspati in his Bhāmatī, a commentary on the bhāṣya of Śankara on the Brahma-sūtra II. 2. 37, speaks of four types of the followers of Śiva. Of these we have found ample literature of the Śaivas and the Pāśupatas, and had ventured to suggest that the Kāruṇika-siddhāntins were also the followers of the Āgamic Śaiva thought. But we could find no literature of the Kāpālikas or of the Kālamukhas referred to in the bhāṣya of the same sūtra by Rāmānuja. In the Sūta-samhitā we find the names of the Kāmika and other Āgamas, the Kāpālikas, the Lākulas, the Pāśupatas, the Somas, and the Bhairavas, who had also their Āgamas. These Āgamas branched off into a number of sections or schools. In our investigation we have found that the Lākulas and the Pāśupatas were one and the same, and we have the testimony of Mādhava, the author of the Sarva-darśana-saṁgraha, to the same effect. Sūta-samhitā was probably a work of the sixth century A.D., while Madhva’s work was of the fourteenth century. Nevertheless, it seems that the Pāśupatas were earlier than the Lākulas. Neither Śankara nor Vācaspati speaks of the Lākulīśas as being the same as the Pāśupatas. But some time before the fourteenth century the Lākulīśas and Pāśupatas had coalesced and later on they remained as one system, as we find them regarded as one by Appaya Dīkṣita of the sixteenth century in his commentary, Vedānta-kalpataru- parimala on Brahma-sūtra 11. 2. 37. But there can be but little doubt that the Lākulas had their own Āgamas long before the sixth century A.D., which is probably the date of Sūta-samhitā. We find references to the Bhairavas, and the name Bhairava is given to Śiva as the presiding male god wherever there is the Śaktī deity repre­senting the limbs of Śaktī, the consort of Śiva and the daughter of Dakṣa. But we have not been able to secure any Āgamas containing an account of the philosophical doctrine of this creed of Bhairavism, though we have found ritualistic references to Bhairava. The Sūta-samhitā also refers to the Āgamic Ṛṣis such as Sveta, etc.; each of these twenty-eight Ṛṣis had four disciples, thus making the number one hundred and twelve. They are also referred to in the Sūta-samhitā (Book iv, ch. xxi, verses 2-3), where they are described as smearing their bodies with ashes and wearing the necklaces of Rudrākṣa. We have noticed before that Śiva-Mahāpurāṇa also refers to them. The existence of so many Śaiva saints at such an early date naturally implies the great antiquity of Śaivism. These Śaiva saints seem to have been loyal to the Varṇāśrama dharma or duties of caste and the stages of life.
global_05_local_5_shard_00002591_processed.jsonl/32917
Interviewing the Alleged Secret Master of the Qanon Conspiracy Qanon is a conspiracy theory that supposes President Donald Trump is at war with an ancient pedophile cult. When Qanon believers began to show up at Trump rallies, the mainstream media took notice. In early August, BuzzFeed published an article that theorized the whole thing was an elaborate prank by leftists activists. Their evidence was a 1999 book about religious rebellions during the 16th century. It’s title? Q. Wu Ming 1, one of the authors of that book joins us today to talk about Q, Qanon, and the importance of conspiracy theories in modern life. Take our listener survey! See for privacy and opt-out information.
global_05_local_5_shard_00002591_processed.jsonl/32926
Care to play a game with the YOUniverse? Positive Head Podcast #1328: You Are One With It All In today’s episode, Erica talks about the energies surrounding 11/11, that the time surrounding it is great for manifesting, and how powerful the number one is.  She also shares stories from her 11/11 journey and the signs she received while traveling through Sedona. Care to play a game with the YoUniverse?  Learn why Brandon takes Purium superfood products every day at and get 25% off with code POSITIVEHEAD. Follow us on Instagram, YouTube, and Facebook: @WeAreOptimystic Check out our archive of 1342 inSPIRITional episodes here and follow us on these podcast platforms! Google Play
global_05_local_5_shard_00002591_processed.jsonl/32929
Intro to Intranet CMS: 10 Essentials Your Content Management System Needs These days, just about every company has an intranet. Whether it’s a formal software solution or a collection of storage and communications tools, an intranet is crucial to the day-to-day operations of any business that works digitally. And while an intranet may function well on its own at first, the amount of content it contains can quickly grow out of control. This is where an intranet content management system, or intranet CMS, comes into play. Integrating a CMS intranet solution should help create less work, not more of it. With this in mind, your intranet CMS needs to be carefully chosen to ensure its success. As you enter the planning stage, there are a few essentials to look for in a CMS intranet candidate. But first, let’s review how a content management system fits into your overall intranet structure. What is an intranet CMS? As you already know, your employee intranet is an internal network that is used for communication, collaboration, and information management within your organization. Over time, the amount of content required to convey this information snowballs to a volume that is difficult to publish and manage. An intranet CMS is a content management system that helps with every step of this process, from creating and publishing content to accessing, updating, and archiving it. So how do you choose the right CMS intranet solution? We’ve compiled a list of ten things to keep an eye out for to make sure your content management system is a tool that helps your employees and doesn’t hinder them. CMS Intranet 10 essential components of an intranet content management system 1. Integration with existing technology The most essential quality in an intranet CMS is that it integrates seamlessly not just with your intranet, but with the full spectrum of digital tools that your employees use on a day-to-day basis. Make sure apps like instant messaging, project management, HR systems, and data analytics can all work fluently with the content management system without the need for cumbersome middle steps. 2. Intuitive user interface Varying levels of digital dexterity across an organization means that any widely used tools need to be intuitive enough for anyone to use with minimal training. A user interface that mimics tools and platforms employees are already accustomed to using – such as social media – helps improve adoption and efficiency. While this might sound trivial, it goes a long way in boosting the overall digital employee experience, which is associated with boosted employee happiness, higher profits, and even better customer service. 3. Responsive design Many employees use a variety of devices to perform work functions, such as smartphones and tablets. As this behavior is only expected to increase with time, it’s key that your content management system can be accessed from more than just a computer. Following the same line of thought, make sure any content published through an intranet CMS is enabled for responsive viewing across devices, too. 4. Support for different content types The content you distribute via your intranet probably consists of many different types, including text, photos, videos, presentations, and more. Multimedia support should be non-negotiable as you’re looking for a content management system. 5. Easy deployment The process of rolling out your CMS employee intranet solution may take some time. With that said, the deployment process doesn’t need to be overly complicated. With so many off-the-shelf solutions available today that require relatively little configuration, there’s no need to spend months designing a custom solution as costs accumulate. 6. Regular updates Once you’ve deployed your CMS intranet, the work isn’t completely done. Content management systems need regular updates to stay abreast of industry trends, new technologies, and security threats. Make sure updates are released regularly in a way that doesn’t knock your entire system offline for long periods of time. 7. Searchability An intranet CMS is virtually useless if employees can’t find what they need. Look for a robust search function that supports multiple criteria and can filter content by properties such as type and date. 8. Analytics As with all the technology your organization uses, your goal should be to constantly strive to improve your CMS intranet over time. With analytics, you can easily see how employees interact with content, which types are most effective, how content is accessed and shared, and more. Integrated analytics are also useful in collecting data like survey responses from your employees without having to jump through hoops to process the results. 9. Governance management An intranet content management system can’t replace governance for your intranet, but it can certainly help. A good CMS can automatically update content with the newest versions, detect and flag duplicates, and even automate some processes like naming files. These small features will make a huge difference in how your content organization looks one, two, or five years down the road. 10. Customization Every company’s needs are different. Although you don’t need to build your own content management system from scratch, having the ability to control and finetune certain features and functions can make or break its success. Make sure you can adjust branding, tweak templates, and determine governance rules as needed. Your CMS intranet should adapt to fit your needs, not the other way around. Choosing the best employee intranet CMS The first place to start when looking for an intranet content management system is to narrow down your options based on what works with what you already have. If your team is using Microsoft SharePoint and/or Office 365, Powell 365’s content management system is the perfect off-the-shelf solution that comes prebuilt with all the tools you need. Schedule a demo to see how we deploy CMS intranet solutions in record time. 2020-09-30T13:53:12+01:00June 23rd, 2020|
global_05_local_5_shard_00002591_processed.jsonl/32946
Pub.dev License A library for Flutter developers. fappconfiguration's a package that help you configure your application for dynamic content, example white label, flavors, server side rendering and routing. Application configuration allow you to provide dynamic routing, dynamic theming, dynamic localization, dynamic widget and more. 1- You can specify theme for light and dark mode Light and dark theme 2- You can specify different languages supported by the app, see Application configuration. 3- You can change specific widget dynamically on the fly, see Application configuration and also Dynamic Widget Provider. Look at the button on the right end of the screen, even if the screen code and behavior did not change but the widget did. Dynamic Widget Switching 4- You can override or provide new routes for every Application configuration For example we want to provide different about page for both yellow white label and green white label but without change the home page code. Route Override 5- You can also specify DI dependencies for an Application configuration. This is possible by leveraging the Provider package and providing your dependency using the dependencies field of your application configuration. 6- You can easily update the application configuration on the fly using FAppConfigurationApplication update method. There's more that you can do, please see the example project. The library currently provide two out of the box App widget that support application configuration: For Material design DefaultMaterialApplication. For Cupertino design DefaultCupertinoApplication. If you want to create your own, just extend the FAppConfigurationApplication. For any feature request or bug please create a github issue
global_05_local_5_shard_00002591_processed.jsonl/32950
Extended essay mandarin A term which originated from the Cantonese language. Emmitt Smith was a prototype for L. It can take a little practice at first, but for most people class modeling quickly becomes second nature. We shall have the right to modify or amend this Notice at any time and will place the updated Notice on our website at www. This problem rears its head throughout computing. Before we start, there are two things to keep in mind. This is because Java offers essentially zero support for the Properties Pattern. Maintaining local languages and cultures should be prioritised to ensure a rich world heritage for future generations. He was to draw on memories of Bradford in many of the works he wrote after he had moved south, including Bright Day and When We Are Married. They're effectively the names in your current namespace, like Java's fully-qualified class names. If Joe the Rookie comes along next season, the announcers might say: As part of your seminar and coursework preparation, you are expected to read the required texts and undertake short and manageable ethnographic projects with a partner or in groups. What are the advantages and disadvantages to having one language in the world. So the simplest implementation of the Properties Pattern is a Map of some sort. Race and the Priesthood June 18, As with any work or school-generated assignment, following the directions is half the battle. March 22, As soon as I decided to use the Properties pattern centrally in my game, I should have decided to use a programming language better suited for implementing the pattern: Relational Modeling Relational database modeling is a bit harder and takes more practice, because its strength stems from its mathematical foundation. Shanxi Province is the most polluted areas of China. This Notice describes how the Personal Data that you provide us will be used. International Baccalaureate Malaysia. Marlborough College Malaysia achieved accreditation to become an IB World School in April This is the outcome of going through the rigorous and stringent IB authorisation process which began in May Extended Essay. 50 Excellent Extended Essays. IB Chinese (The International Baccalaureate and Mandarin Chinese): The facts Click on any link below to view an example of an outstanding extended essay. Web sites, e-mails and phone numbers for SF State departments are listed below, in alphabetical order. The IB extended essay is part of the requirements of the International Baccalaureate high school curriculum. It is a 4,word essay that each student is expected to research and write independently. About us. John Benjamins Publishing Company is an independent, family-owned academic publisher headquartered in Amsterdam, The Netherlands. More. Crop production is vital to Japan despite limited arable land (13% of the total area) and the highest degree of industrialization in Asia. Extended essay mandarin Rated 5/5 based on 71 review ib-simplified | Extended Essay
global_05_local_5_shard_00002591_processed.jsonl/32951
VOICES by Mike Miner I hear voices. They creep like ivy up the walls of this once grand house, rising like smoke, scuttling like rats, sneaking like thieves, they rattle like the bones of the skeletons stuffed into the closets. They sound, these voices, like violent death. Portraits of my once grand family decorate the walls. The owners of these voices stare at me with frozen eyes, well dressed prisoners captured under glass. Vanity was just one of their deadly sins. The same mad blood pulses through my veins, pounds in my ears. I try to ignore their ceaseless cricketing, maybe it’s just a trick of the wind, the house settling. I try not to listen, not to hear. It never works. Ignored, they increase, in volume and number, untended, they grow like weeds, like rust on a forgotten blade. One voice, unmistakable, deep as a dry well. My grandfather’s voice. Mean and nasty, like the picture of him hanging in the study. A gray moustache droops over the closest he could get to a smile, a vicious sneer. I know what he wants. Always the same thing. Insatiable. But I want it too, sometimes. Let’s take a drive. His voice is syrup, thick and sweet but it leaves a bitter cough medicine aftertaste. I shiver. They hanged him. A murderer, they called him, a rapist, a monster. He’d been a Doctor. One article suggested he had developed an unnatural curiosity about human pain. I have all the newspaper clippings. After that, the family, the house fell into disrepair. We are run down, this house and I; ruined; ruins. The sun is just a pink rumor in the sky as I drive down the long, curvy driveway, an alligator’s back of cracks and bumps. It looks as though the foundation plants, rhododendron, azaleas, hydrangeas are trying to pull the estate down. Or are they the only things holding it up? There are always lone joggers at the University at night running around the pond at the edge of campus. His low, rumbling growl says, Her. Tired of ignoring him, I give in, surrender to the darkness, join it. I am the shadow at the far end, the dark end, that comes to life. My grandfather was fond of chloroform. I am too. The more they struggle, the deeper they breathe, and so on. Such a little thing, she doesn’t put up much of a fight. She fits nicely in the trunk of my Chevelle. The voice of my grandfather is quiet, satisfied but his gang hoots and hollers. In the condemned hallways of my mind, nasty echoes of his infernal voice resonate. Muttered agreement. Yes, hell yes, amen, they chime. A thug chorus seems to rub its palms together. There are other voices. Pleading, plaintive voices. They flutter, struggling to be heard amidst the howls of the others. They are the only beautiful things in my life, an enchantment, a symphony. Will-o’-the-wisps. If only I could capture them, hold their melody close to my ear. Again, one voice leads. A high, female soprano begs me not to listen to the others. This voice I know. My mother. There are no picures of her on the walls, no reminders of what happened. She sounds a lot like she did when she was alive, beautiful and sad. Always trying to get me to do the right thing, Let her go, Son. I miss her. In the background, still more voices. I know these too, but not as well. Mostly women, girls, the occasional unlucky witness. They blend together, the victims, gasping a collective, No. The first voices, the bad voices get loud, angry. They shout. They mock the soft voices with their cruel falsettos, try to drown them out. Is there a tremble of fear, a note of worry? I can just make out my mother’s quiet sobs and a soft humming behind her, a phantom choir. I have to bring the girl to the study, so he can watch. I savor the feel of her in my arms, her little bones, warm skin, shallow breathing, this rare intimate touching. Set her right there. His bellow an ecstatic whisper. The girl’s eyes are pure terror and confusion. When she sees the knife, the confusion evaporates. She perspires, liquid fear, her scent intoxicates. She squirms against the straps on her wrists, her ankles. The knife glides up the middle of her shirt. I’m surprised by her curves. Her whole body quivers, her skin is all goose flesh. Her jogging shorts are off with one stab. A piece of my drool lands on her skin. She flinches, as if it was acid. Her bra and panties are pink. A whisper of the blade and they are gone. She screams silently into the rag in her mouth. I need to hear her voice. My grandfather doesn’t like it. The hard voices cajole, Gut her, have at her. What are you waiting for, boy? I remove the rag. She takes a deep breath. Stops crying. Gathers herself. Hazel eyes, like my mother’s. A simple, breathless, No, is all she offers. My mother’s flock echoes her. Or is she their echo? Can she hear them? A memory returns, like a faded black and white photograph. My mother in this room. My grandfather with a knife. I was what? Three. Four? Watch and learn, boy. My mother’s eyes held mine. Never raised her voice. Sang to me. Lullabies. Can this girl hear her? Get on with it! The old man hollers. You know what to do. The girl begins to hum, softly, as if I’m not in the room, an incantation. My mother’s eyes look at me. Give me the knife, son. An unholy din erupts in my head. Voices snarl and bark. I hear a rhapsody of black oaths. Thoughts like bee stings – make them stop, Mom, make him stop. Stop. I offer the blade to her. The voices have become a heavy metal opera. Something Wagner would have composed. A collision of cymbals and bass drums and soaring arias. The girl must hear them because each stab of the blade is in time to the twisted music in my head. The pain is exquisite. The girl holding the blade is a vision, a Valkyrie, wearing only my blood. The voices fade. The girl fades. Now, just my mother, her face, her voice, a lullaby. Mike Miner lives and occasionally writes in Connecticut. He has been published or has work forthcoming in Narrative, Pank Magazine, The Flash Fiction Offensive, Shotgun Honey and Solstice :A Magazine of Diverse Voices. He received his MFA from the Solstice Program of Pine Manor College. He sometimes hears voices too. 3 thoughts on “VOICES by Mike Miner” Leave a Reply to ajhayes2 Cancel reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/32959
Skip to main content Boosting framework for Bob Project description Boosted Learning Algorithms This package is part of the signal-processing and machine learning toolbox Bob. It implements a generalized boosting framework, which incorporates different boosting approaches. Complete Bob’s installation instructions. Then, to install this pacakge, run: $ conda install bob.learn.boosting Download files Files for bob.learn.boosting, version 2.0.12 Filename, size File type Python version Upload date Hashes Filename, size (9.9 MB) File type Source Python version None Upload date Hashes View Supported by
global_05_local_5_shard_00002591_processed.jsonl/32991
WPBakery Page Builder / Visual Composer Master Course Easily Build Wordpress Web Pages / Wordpress Website - For Yourself, For Your Business, or For Someone Else The WPBakery Page Builder / Visual Composer Master Course is a user focused course (as opposed to a course aimed at plugin developers building addons and integrating with WPBakery), and weighs in at around 3.5 hours of instruction. While there are a couple of other courses on Udemy that do include WPBakery instruction, this is the only one that's devoted entirely to the plugin, the others mentioned just cover the basics in a section or two. Outside of Udemy, there are a couple of other small courses about WPBakery, but nothing that goes into the same level of detail. The main downside to the WPBakery Master Course is that it's getting a bit old now - it hasn't been updated since 2018, and of course the world of web development moves fast, quite a lot has changed since then. Should you buy this course? The fact that it's pretty much the only one available with this level of detail would suggest yes, it's practically your only choice, however the fact that it's so dated is not ideal. If video courses are your preferred method of learning, and you want something self contained rather than trying to piece things together from multiple unconnected youtube videos, I would suggest you do try this course, but with the understanding that you won't necessarily be able to directly translate what you learn without a little work. The WPBakery course is still good for learning the fundamentals, it's just not perfect.
global_05_local_5_shard_00002591_processed.jsonl/32992
All script apps such as forums or e-stores store their data in a database - a collection of cells and tables that contains the website info such as items, prices, comments, and so on. Anytime you open a particular page, the script connects to the database and retrieves the necessary data, then displays it. The intermediary software which connects the script and the database is referred to as a database management system and one of the most famous ones is MySQL. The latter is widely used because it works on a variety of platforms (Linux, Windows, UNIX) and with a variety of scripting languages (PHP, Perl, Python, Java), not mentioning its wonderful functionality even with large databases. A lot of widely used platforms including WordPress or Joomla use MySQL databases to keep their content. MySQL 5 Databases in Cloud Hosting Creating or editing a MySQL database shall be really easy with any of our cloud plans. That can be performed via our feature-rich Hepsia CP where you can create or erase a database, set up a backup with only one click or take advantage of the highly effective phpMyAdmin instrument so as to modify cells and tables or import an entire database if you are moving a script-driven site from another service provider. You may also enable remote access to any database within your account and choose from what IP addresses the connection will be established, so that you can guarantee the protection of your information. Should you decide to use any of the script platforms which we offer with our script installer, you will not need to do anything simply because our system will create a new database and link it to the Internet site automatically. If you experience any difficulties to control your databases, you should check our help articles and training videos or get in touch with our tech support team. MySQL 5 Databases in Semi-dedicated Servers All of our semi-dedicated hosting plans provide MySQL 5 support and the administration of your databases will be very easy. With just a few mouse clicks you’re able to set up a brand new database, remove an existing one or modify its password. The Hepsia hosting CP will also provide you with access to more advanced features such as a one-click backup and remote accessibility. For the latter option, you could add only the IP address of your computer to be sure that nobody else will be able to access your information. That way, you can manage the content of any database inside the account using any app on your PC. If you prefer to do this online, you could use the phpMyAdmin tool, that is available through Hepsia. You shall also be able to view hourly and daily MySQL statistics, which will show you how your Internet sites perform and if any of them has to be optimized.
global_05_local_5_shard_00002591_processed.jsonl/32999
• Home  /  • Video Reviews •  /  If You’re Under 1K Subscribers… Try This Strategy Right Now! If You’re Under 1K Subscribers… Try This Strategy Right Now! By reviews / 29. October 2020 Learn a powerful strategy for growing your YouTube channel to 1000 subscribers and beyond! ****** Get a 30-day free-trial on any vidIQ paid plan here ➡️ http://vidiq.com/think Big thanks to vidIQ for sponsoring this video! Some product links are affiliate links which means if you buy something we’ll receive a small commission. 📝 Videos and Resources Mentioned in This Video 📝 1. 📈 Install and start growing your YouTube channel with vidIQ today at http://vidiq.com/think 2. (Video) How to Use the “VS. Video” Strategy to Get Views Fast! (Part One in This Series) 3. (Video) Erika Kullberg Shares How She Used the “Trend Surfing” Strategy to Get Over 3 Million Views https://youtu.be/QZT_D45nenc 4. 📕 Get a copy of the best-selling book, YouTube Secrets here: 5. FREE YOUTUBE MASTERCLASS 🎯 Learn how grow a high-impact and high-profit YouTube channel in 2021 ➡️ http://ThinkMasterclass.com 0:00 Getting Your First 1000 YouTube Subscribers 1:06 How to Use Trending Topics to GROW Your Channel 5:45 Example: How a New YouTuber Got 61,000+ Views with This Strategy 8:36 Example: How Erika Got 3 Million Views in 8 Months with This Strategy 9:56 Example: How to Use This Strategy in Different Niches 12:06 The Definition of Trend Surfing™ 13:36 How to Use Google Trends to Come Up With Good Video Ideas 20:05 Practical Ways to Use Trend Surfing™ 24:59 TOOLS for Finding Trending Topics in Your Niche 25:28 (Tool) Keyword Inspector Trending Videos 28:12 (Tool) Most Viewed Videos for Specific Topics 30:26 (Tool) Top Videos Watched by Your Subscribers 33:28 (Tool) Trending Videos for Specific Search Terms 36:45 The 5 Elements of YouTube Videos that Get Massive Views! 38:09 How this Strategy Helped Me Go Full-Time on YouTube 39:16 How I Used Trend Surfing™ to Grow My Brand New YouTube Channel 42:30 The Key to Starting and Growing Your YouTube Channel Right Now Sean Cannell on Social Media: Video Gear Used for This Live Stream: In this video Sean Cannell from Think Media shares how to get more views and subscribers using a strategy called Trend Surfing™. Learn how to use trend surfing to quickly get your first 1000 subscriber on YouTube. But don’t underestimate this strategy the top YouTube creators and entrepreneurs use to grow huge channels with millions of views! #thinkmedia #thinkmarketing #seancannell All Rights Reserved. Copyright, Liability Waiver and Disclaimers Leave a comment:
global_05_local_5_shard_00002591_processed.jsonl/33032
What Is God’S Plan Of Salvation? Who will enter heaven? enter into the kingdom of heaven; but he that doeth. the will of my Father which is in heaven.. How does one become sanctified? To become Sanctified, or Holy, one must do all that he can to live as Christ lived, according to the teachings of Christ. One must strive to live a holy life to truly be considered Holy. What is the purpose of the plan of salvation? What is the salvation of God? In religion and theology, salvation is the saving of the soul from sin and its consequences. It may also be called deliverance or redemption from sin and its effects. How do you gain salvation? Why is salvation so important? What is the full meaning of salvation? noun. the act of preserving or the state of being preserved from harm. a person or thing that is the means of preserving from harm. Christianity deliverance by redemption from the power of sin and from the penalties ensuing from it. Can you pray for someone after they die? When a person dies his soul goes to either heaven or hell. There is no second chance after death. The Bible tells us, “Man is destined to die once and after that to face judgment” (Hebrew 9:27, see also Luke 16:19-31). It would do no good to pray for someone who has died. What is the Jesus prayer word for word? The prayer can be from as short as “Lord, have mercy” (Kyrie eleison), “Have mercy on me” (“Have mercy upon us”), or even “Jesus”, to its longer most common form. It can also contain a call to the Theotokos (Virgin Mary), or to the saints. The single essential and invariable element is Jesus’ name. Is salvation through faith or works? The Joint Declaration never mentions the expression Sola Fide and the Catechism of the Catholic Church clearly teaches that salvation is obtained by a combination of both faith and good works, which are considered to be a human response to God’s grace. How do you pray for salvation? What is God’s great plan? God’s Great Plan memorably recounts the greatest rescue story of all time. In concise rhyming narrative, it tells of creation, fall, redemption, sanctification, and glorification. What is the order of salvation? Ordo salutis (Latin: “order of salvation”) refers to a series of conceptual steps within the Christian doctrine of salvation. What is God’s reason for salvation? All need forgiveness of sins before God, and Scripture proclaims that all have been justified, for “the result of one act of righteousness was justification that brings life for all men” (Romans 5:18). Saving faith is the knowledge of, acceptance of, and trust in the promise of the Gospel.
global_05_local_5_shard_00002591_processed.jsonl/33036
Prev NEXT   How Bearings Work Some Interesting Uses There are several types of bearings, and each has its own interesting uses, including magnetic bearings and giant roller bearings. Magnetic Bearings Some very high-speed devices, like advanced flywheel energy storage systems, use magnet bearings. These bearings allow the flywheel to float on a magnetic field created by the bearing. Some of the flywheels run at speeds in excess of 50,000 revolutions per minute (rpm). Normal bearings with rollers or balls would melt down or explode at these speeds. The magnetic bearing has no moving parts, so it can handle these incredible speeds. Giant Roller Bearings Probably the first use of a bearing was back when the Egyptians were building the pyramids. They put round logs under the heavy stones so that they could roll them to the building site. This method is still used today when large, very heavy objects like the Cape Hatteras lighthouse need to be moved. Earthquake-Proof Buildings The new San Francisco International Airport uses many advanced building technologies to help it withstand earthquakes. One of these technologies involves giant ball bearings. This content is not compatible on this device. Click on "Earthquake!" to see the earthquake bearing support system at work. The 267 columns that support the weight of the airport each ride on a 5-foot-diameter (1.5-meter) steel ball bearing. The ball rests in a concave base that is connected to the ground. In the event of an earthquake, the ground can move 20 inches (51 cm) in any direction. The columns that rest on the balls move somewhat less than this as they roll around in their bases, which helps isolate the building from the motion of the ground. When the earthquake is over, gravity pulls the columns back to the center of their bases. For more information on bearings and related topics, check out the links below. Related HowStuffWorks Articles More Great Links
global_05_local_5_shard_00002591_processed.jsonl/33077
Which Country Has Best Government? What is the oldest form of government still in use today? Some historians suggest that the Native American Six Nations confederacy (Iroquois), which traces its consensus-based government tradition across eight centuries, is the oldest living participatory democracy.. What countries are run by socialism? What is the most free country? What is the most loved country in the world? What countries violate human rights? Almost 100,000 people have been displaced as a result of the violence. It is also said that countries such as Syria, Somalia, Turkmenistan, Libya, Cuba and Saudi Arabia are more places where people suffer from some of the most severe, systematic abuses of human rights. Which country violates human rights? It says countries such as Syria, Somalia, Turkmenistan, Libya, Cuba, and Saudi Arabia are places where people suffer from some of the most severe, systematic abuses of human rights on the planet. What country was the first republic? IndiaVaishali, situated in Vaishali district in Bihar, is believed to be the world’s first republic and is currently an archaeological site in India. Vaishali derives its name from King Vaishalik, whose heroic deeds find a reference in the Ramayana. Is US a democracy or a republic? Eugene Volokh of the UCLA School of Law notes that the United States exemplifies the varied nature of a constitutional republic—a country where some decisions (often local) are made by direct democratic processes, while others (often federal) are made by democratically elected representatives. Which country is No 1 in world? What country was the first democracy? The term “democracy” first appeared in ancient Greek political and philosophical thought in the city-state of Athens during classical antiquity. The word comes from demos, “common people” and kratos, “strength”. Led by Cleisthenes, Athenians established what is generally held as the first democracy in 508–507 BC. How is Switzerland governed? Three political levels share power in Switzerland: the Confederation, the 26 cantons and over 2,250 communes. The Swiss federal government (the Federal Council) is made up of seven members, who are elected by parliament. … 15 political parties are represented in the Swiss Parliament. Who is known as the father of democracy? Which country has the best rights? The 25 Best Countries in the WorldCOUNTRYCARES ABOUT HUMAN RIGHTS RANKOVERALL BEST COUNTRY RANKNetherlands19Sweden28Canada32Denmark4136 more rows•Apr 21, 2020 What country is a pure democracy? Which country has least human rights? Check out the 25 countries with the least freedom below:Syria.Tibet* … South Sudan. … Eritrea. … North Korea. … Turkmenistan. … Western Sahara* … Equatorial Guinea. … More items…• Which country has the best democracy? Northern Europe leads the way for democracy with Norway recording the highest score, 9.87. Iceland came second with 9.58 while Sweden was third with 9.39. The United States only managed a score of 7.96 which left it in 25th position. Is India a poor country 2020?
global_05_local_5_shard_00002591_processed.jsonl/33088
From El cuaderno de Maya: Una mujer gruesa, de risa contagiosa, saludó a Manuel Arias con un beso en la mejilla y a mí me observó un poco desconcertada antes de decidirse a besarme también. ¿Americana? -le preguntó a Manuel. ¿No se nota? -dijo él. ¿Y qué le pasó en la cabeza? -agregó ella, señalando mi pelo teñido. Nací así -le informé, picada. ¡La gringuita habla cristiano! -exclamó ella, encantada. Every translation in context of the phrase is "speaks plain English." Was the language translated from Spanish to English by someone because even in translating to 3rd languages like French still gives "English"? The phrase only makes sense as Spanish in the example above as they are in Chile, and Wikipedia's article on names given to the Spanish Language During the presence of Moors in Hispania, Spanish was sometimes given the name cristiano ("Christian") to distinguish it from the Arabic and Hebrew languages...The expression Hábleme en cristiano "talk to me in Christian", uttered to people not speaking Spanish at the moment, is used in opposition of the other languages of Spain, which is felt as annoying by them[citation needed]. Later wikipedia seems to indicate it may mean whatever language is more clear to the speaker: • 1 I like the "can't you talk United States?" of the in context ones :) – Penguin9 Apr 10 '17 at 8:54 • 1 Yes, as noted by in the quote from Wikipedia "háblame en cristiano" was widely used (and sometimes still) to people speaking languages other than Spanish in Spain. – fedorqui 'SO stop harming' Apr 10 '17 at 10:57 "Háblame en cristiano" simply means "Please use a simple language so I can understand" When someone is using a very technical language you could say "En cristiano por favor" so the person switches to a simpler language you can understand. Obviously if you only speak Spanish and someone is using any foreign language it will also apply. So if you are translating from a text in Spanish that uses that expression you could translate that to "plain English" Update The equivalent English expression is In layman’s terms, please | improve this answer | | • The answer is good, but touches on something far worse. Simple language rarely makes it easy enough to understand. :( – Joshua Apr 9 '17 at 21:49 • 1 Given that the characters are in Chile and they are in fact speaking Spanish, in this case I wouldn't translate háblame en cristiano as speak plain English, but as speak my language or something similar. That way the translation does not relay on the other language. I would propose even translating it as speak Spanish (the language the characters are speaking in) if the novel makes it clear somehow that they have been talking in Spanish. – Charlie Apr 10 '17 at 6:54 • @Joshua Are you referring to the irony in not understanding the statement used to mean "say it so we can understand it"? – user5389726598465 Apr 10 '17 at 8:47 • It does not mean "Please use a simple language...". It is an imperative, an order, not a suggestion or a plea. So, unless you are talking with someone you have a lot of trust with, it is an expression to avoid as it can be considered as rude. Doubly so if the issue is that someone is talking to you in another language (the expression implying that their language is not as good as Spanish). To express it in English, someone people will understand "habla en cristiano" as "do not speak a barbaric language". – SJuan76 Apr 10 '17 at 9:21 • 2 My Catalan friends told me that the Guardia Civil often used this phrase during the Franco era if they spoke Catalan in the street. – John Powell Apr 10 '17 at 11:22 Many times in translating a phrase one needs to think how it would be expressed in your own language. In this case the original meaning carried very strongly the connotation that 'the christian language' was "our language". I think that is the term that applies here. Also, the use of the condescending "gringuita" reinforces that interpretation. | improve this answer | | Your Answer
global_05_local_5_shard_00002591_processed.jsonl/33107
Best Brahman Status for Whatsapp, Facebook, Instagram Here are the best collections of Brahman status for Whatsapp, FB, Instagram captions, and Brahman sayings. The lion’s sons are known only as lions, Brahmins are recognized among millions. The pure mind is itself Brahman; it, therefore, follows that Brahman is not other than the mind of the sage. The earth trembles, the dolls are big courts cheer the Brahmin when the sky echoed. If you burn, let it burn Extinguish is not my job Do not burn to ashes So Brahmin is not my name Great indeed are the devas who have sprung out of Brahman. On the land of karma, flowers of fortune bloom, If luck is on the high, then only a Brahmin’s home is born. Never bow what will you bow Brahmanism is a fire that will keep on burning. Brahmins do the highest order, Then whether it is development or destruction of someone. Whenever a Brahmin wants to destroy Saturn When a Brahmin ascends Rahu, Saturn makes it right. On the land of karma, Luck’s flowers bloom. Luck if high Only then do you get birth in the house of #Brahmin … Ajay Shri Parashuram ji We are not a stone, we are a child of a Brahmin. The scriptures and weapons from which they were born are old Earth was also made heaven, which is the story of that Brahmin. Previously proud to be a Brahmin, now proud to be a Brahmin. I will sing the song of Mahadev to my tune I have come as a Brahmin and I will come again to become a Brahmin. Brahman, They also do high-quality bowls! Whether it is Bo Vikas or Vinas…! There is a history of Brahmins written in big golden letters. Why do you take away the rule of the Panga Pandits? For all this diversity, the core of East Indian spirituality is Hinduism, especially as disclosed in the notion of Leela (also spelled Lila), or play. The entire cosmos is a Leela, a dance of energy, a drama staged by Brahman, the Absolute. Leelas are also specific celebrations. No matter how much anyone tries to be like us, Lions are born, not created, Jai Brahmin empire, Jai Parashurama. Violence – Non-violence accountant Pandit has played Holi for blood for defense. Walking on fire Will walk I was born as BRAHMAN I will die by becoming BRAHMAN It is said that killing even a fetus is as criminal as killing a Brahman; and that for killing a female or woman, the punishment is to suffer in the Naraka, or Hell called Kata Shutala, for as many years as there are hairs on the female’s body, and that afterward such person shall be born again and successively become a leper. Brahman Status for Whatsapp, Brahman Quotes The story is written by small people … History is written. The day Pandit opens old history, On seeing us, even the humble ones will speak Zay Zay Brahmin. Why is the burden of sin and virtue increased? Pandit found equality in happiness, sorrow, and profit and loss. Read what is the story of a Brahmin in the eyes Their family is habitual in staying in attitude. See who has seen him with knowledge from Nayano That Brahmin does not sleep overnight for human welfare. Do not show your attitude, son, will burn If he hits the Pandit, he will be beaten to the house. When Brahmins come, Vasant Ritu comes Nature improves with the arrival of the spring season Culture improves with the arrival of a Brahmin. Chess tricks are lost to them. Those who practice… We are anxious about Lord Parshuram, do not worry about defeat and victory. Brahman sutras contain directions regarding yagna for Brahmins. If Brahmins change, the results change, All the scenes, all the consequences are changed. The Pandit is hungry and is called Sudama The one who becomes a Pandit becomes a Chanakya The pundit who became angry then becomes Parashurama. The scare of Yamraj is called Yamdoot, Yamraj, who is scared, is called a Pandit, If you do not believe, then read the history of Ravana. What work is that Brahmin who does not take the name of Parashurama. Brahmin Ekam Brahmin douna Whenever Brahmin’s blood boils The corner of the shivering earth. Neither eyes are evil nor mouth is black, What will any of you spoil, you are going to get your head off. Burn if let burn Not our job to extinguish, Torches that don’t turn to ashes So Brahmin is not my name. Pundit bad or bad world, could not decide The fucking pundit became everyone, but none of the pandits could. Money is not a boast. There is pride in being a priest. The lion’s ride and the pundit’s luck are destined for the lucky ones. No need to find support Pandits are equal to an army alone. Jai Parshuram! When the shadow falls, So your father Brahmin came to understand. All science is transcendental or else passes away. Botany is now acquiring the right theory – the avatars of Brahman will presently be the text-books of natural history. We Brahmins are calm, so is Shri Ram, And when erupted, Parashurama is there. Dua should not be with words because of heart Brahmins also listen to those who cannot speak. The scare of Yamraj is called Yamdoot by which Yamraj is called Pandit. Be it the market of Gijgarh, “Black Safari Car”, be it, my friend, And the beholder will say, “May this be the” Chhora of Braman “My choir’s yaar “. Being old is very special, The love of a Brahmin is immense. Do not show attitude If it will hit a Brahmin. Then he will be at home. Thy yo ego so two days story Ar Mahara Attitude So Childhood as a family Show attitude Is also an art Which comes only to the pandits. Pulse free And goods without attitude Brahmin does not like kauni…. Pagali we are Brahmins To rule is in our blood Whether it is on kilos or on hearts !! At one time, the blonde will be a little girl of Brahman from above, every har Mahadev. Thanks for visiting us, comment below your favorite Brahman Status and share this article with your friends. Keep smile be happy.
global_05_local_5_shard_00002591_processed.jsonl/33128
How do I use the TribeHR HRIS integration? When you enable the TribeHR integration, new employee records will get pushed into your TribeHR system automatically when you hire candidates in JobScore. After your TribeHR integration is set up, the Hire Candidate form will include a section "Add New Hire to HRIS" that will let you push the candidate's name, home email, phone number, home address and start date into your TribeHR system.  And hired candidates and filled jobs in JobScore link to the employee record in TribeHR. How to enable the TribeHR integration in JobScore  Step 1: Lookup or create a TribeHR API Key To create an API Key, log into TribeHR as an Administrator and go to "My Profile", then click on "Edit Profile" at the top right of your profile section.  Towards the bottom of the page you'll find an "API Key" section. You will now copy the Key information (see yellow highlighted section above) and paste it into JobScore (see steps below). *NOTE: API Keys are like passwords and should never be given out or shared or made public. Step 2:  Configure your TribeHR integration in JobScore An Admin or Owner will need to log into your JobScore account.  If you're not on the Scale or Enterprise plan, please contact for help accessing this feature. You can activate the integration from your Integrations page.  You will need to know the company subdomain in the URL used for your TribeHR system, your user login, and your user password OR the API key generated in step 1. Be sure the subdomain is an exact match with the spelling used in the URL for your TribeHR system.  For example, if you log in at, your company subdomain is "example". When you click "Activate Integration", we'll test your configuration and save the settings if the test checks out.  Now you're ready to roll! The Hire Date set in TribeHR is the "start date" entered on the Hire Candidate form in JobScore.  Powered by Zendesk
global_05_local_5_shard_00002591_processed.jsonl/33152
IT is almost here! *SQUEE!* And since you are reading this post… you probably already know what IT is! IT just happens to be the most fabulicious, wondermous, funkaperfect challenge this side of Gallifrey! IT is… Picture Book Idea Month! (aka PiBoIdMo) Thirty ideas in thirty days wrapped in unlimited potential! And did I mention there are prizes, too? So why, oh why, am I stuffing myself full of gluten and chocolate? Right now, all I have is: 1. A blank PiBoIdMo notebook. 2. Two twitching eyes. 3. And a bewildered expression as I stare at the aforementioned blank notebook with my two twitching eyes. I’m stuck between a rock and a hard place! I’ve been doing a lot of thinking about my action plan for PiBoIdMo. And though some of my thinking has been helpful… much of it has been less than positive. Here’s a preview of my sordid thoughts: How in the world will I come up with 30 different picture book ideas in 30 days and still manage to maintain any reasonable semblance of sanity? AAAHHHH! How will I get all my homeschool stuffs done? And what about my endless mound of dirty clothes? Then there’s that whole clothing and feeding the munchkins gig. And I definitely, positively have to diffuse the Dustbunny uprising happening in my living room. But the question I should be asking is this: How am I going to get rid of this stinky thinkin’ and get back to creative thinkin’?? Pooh Bear had his Thinking Spot. Henry David Thoreau had Walden Pond. Doctor Who has the TARDIS. And I… I have the shower. That’s right folks. The shower is where I often go for: • Refuge, • A moment of clarity, • And ideas! It’s the one place no one follows me—especially if I’ve missed a shower the day before. (Don’t judge me. I have three kids… it happens.) Matter of fact, the shower is where the idea for BEING FRANK was born! (Seriously. It was!) So instead of staring at an empty page with twitching eyes and a blank expression throughout the month of November, I’m gonna do this: 1. Jump in the shower. 2. Ignore the soap scum crawling up the walls. 3. Add water and suds…scrub. 4. Pray. Think. Pray. Think. 5. Then try and wrangle the new ideas as they slide across my brain. 6. Rinse and repeat—until all the stink is gone (inside and out). 7. Then, I will hurry to my notebook to jot down the latest idea. 8. And by the end of the month, I will have 30 ideas. Some of the ideas might be the definition of brilliant… and some might make me yell, “Why in the world did I think that would work?” Yeah, baby! I like this plan! Visiting my “thinking spot” for 30 days in a row will afford me the chance to do more thinkin’… and less stinkin’. I want my thinkin’ to smell more like a mountainside full of flowers and less like fertilizer. So is your stinky thinkin’ clouding your vision for PiBoIdMo? What’s your plan for getting rid of it? Whatever it is, get busy! You have 30 ideas waiting to bloom and break down those walls! When Donna isn’t homeschooling or battling the laundry, she’s writing children’s stories, poetry, songs, an mysteries. You might find her fishing the Pee Dee River, hiking in the mountains with her family, or visiting her hometown of Cordova, NC. She lives in Concord, NC, and BEING FRANK is her first picture book. You can find BEING FRANK in B&N, on Amazon, Books-a-million and in most independent bookstores. For more information and reviews, check out Flashlight Press’s website.
global_05_local_5_shard_00002591_processed.jsonl/33157
. Grade 4, Illustrative icon Lines of symmetry for triangles Illustrative MathematicsVaries The division of triangles into scalene, isosceles, and equilateral can be thought of in terms of lines of symmetry. A scalene triangle is a triangle with no lines of symmetry while an isosceles triangle has at least one line of symmetry and an equilateral triangle has three lines of symmetry. This activity provides students an opportunity to recognize these distinguishing features of the different types of triangles before the technical language has been introduced. You must log inorsign upif you want to:* *Teacher Advisor is 100% free.
global_05_local_5_shard_00002591_processed.jsonl/33170
Purple Belt Bodily Harm and Pain In this article, we will discuss ways in which you may cause significant bodily harm or pain to an assailant. These methods will be quite graphic. They are not intended to discuss how you should behave toward an attacker. They are intended to explore ways in which you may need to act to save your life or that of another. These actions should not be considered “normal”, but rather as skills or strategies to be employed only when you fear they represent your only viable option. The methods described below can all lead to severe injuries that are likely to require medical attention. These injuries might result in death, a permanent disability, or life-long chronic pain. This level of injury is warranted only in the most extreme circumstances. Law enforcement officials will be required to arrest you and prosecute you if they feel you acted unjustifiably. It is the duty and responsibility of your local prosecutor to seek criminal charges if you cause unnecessary harm to another. Your victim (yes, they will be the victim if you harm them without justifiable cause) or the victim’s family is quite likely to seek civil damages and compensation for medical costs and reasonable pain and suffering. Because you know how to harm someone severely it is your responsibility to ensure that knowledge is not put to inappropriate use. Acquiring a skill does not come with a license to use that skill indiscriminately. You alone are responsible for your actions. Never harm someone unnecessarily. Breaking an Arm When we refer to breaking an arm we are generally talking about four possibilities. These are: • Breaking the upper arm (humerus bone) • Breaking the radius bone in the lower arm • Breaking the ulna bone in the lower arm • Breaking the elbow joint Breaking the three bones in the arm generally requires direct impact force of some kind. Such force might be generated from something like a Tettsui Uchi, a Hiza Geri, or from use of a weapon. These bones are generally hard to break and, without a weapon of some kind, they are very difficult to break as an intentional act. Any force you apply to break these bones may be sufficient to break one of your bones instead. The ulna and radius bones in the forearm are not of uniform size. One end of each bone is thicker than its opposite end. The radius bone is thickest near the wrist while the ulna is thickest near the elbow. This means a strike near the wrist is more likely to break a bone if it impacts the ulna, while a strike to the upper forearm is more likely to break a bone if it strikes the radius. This explains why we do not like to block an incoming Ken Tsuki with our forearm. This would cause our relatively smaller ulna to strike the opponent’s larger radius bone near the wrist.  The bone most likely to break would be our ulna. If you must block a Ken Tsuki use the side of your tightly closed fist or your open palm to contact the opponent’s lower forearm. The elbow joint is a relatively complex structure in which the humerus, radius, and ulna bones come together, along with various ligaments, tendons, and muscles to enable proper support and movement of the lower arm. Breaking an elbow could involve breaking one or more of the three bones. This type of injury often occurs in accidental falls or as a result of major impact trauma such as that which occurs in an automobile accident or from weapons impact. Martial arts injuries to the elbow joint usually involve dislocations of the joint and/or tearing of softer tissues such as ligaments, tendons, and muscles. These are very painful injuries, even though no bones may be broken. A broken bone might result from a powerful strike to the elbow joint. Usually, these breaks occur as a result of forcing a dislocation. A bone is pressed into another bone as the dislocation forces are employed, causing it to break as a result. Such breaks are very difficult to repair and can cause long term or even permanent disability for the injured party. Injuring an elbow is commonly done by restraining the lower arm somehow (commonly by restraining the wrist) and then forcing the back of the elbow to suddenly move inward. Sometimes the wrist is moved in one direction as the elbow is forced in the opposite direction. The result is painful whether or not a serious injury has been caused. With sufficient force, the opponent’s arm may be rendered completely unusable. This could result in permanent disability or even a life-threatening injury (if for example, a major artery has been severed). Injuring a Knee The knee is in many ways analogous to the elbow joint. A force that is applied directly in opposition to the normal bending of the knee will likely result in similar injuries as well. This is commonly initiated by causing an opponent to somehow straighten their leg and then utilizing something like a Yoko Kekomi Geri, Shovel Kick, or Otoshi Empi Uchi to apply a sudden force directly into the front of the knee joint. Attacks to the knee may be done by holding the ankle joint like the way the wrist joint is held when attacking the elbow joint. This might be the method employed when striking with an Otoshi Empi Uchi, say as the result of having trapped an opponent’s kicking leg. However, the knee is often unique in that the ankle may be held in place because the foot is rooted on the ground. Rooting a foot and straightening the knee make this joint susceptible to an alternate injury scenario. One way in which this can be used is to place your foot directly behind the opponent’s foot while your shin presses into the front of the opponent’s shin. Pressing forward with your shin causes a couple of things to occur. The first is that his or her leg is forced to straighten. The second is that the hip is pressed back, further rooting the attacker and dramatically impacting their structure. At this point, the opponent will normally fall backward. If you wish to injure the knee then grasp the opponent’s upper torso to prevent the fall. Additional pressure from your shin will likely cause the tearing of tissues in the knee. This is unlikely to cause breakage of bones in the knee joint but the pressure may be sufficient to cause a significant dislocation and/or associated tissue injuries. If this is not the result then the opponent may still suffer pain and be forced to fall backward. The patella (knee cap) is a bone present in the knee that does not have a similar structure in the elbow. Striking directly into the knee may break the patella. This can result in severe pain, an inability to straighten the knee, and potentially impair the inability to walk. The injury may require surgery to repair but mighty be allowed to heal in place (depending on the nature of the fracture). A martial arts strike sufficient to break the patella has probably also caused other damage to the knee joint. Forcing an opponent to land firmly on their knee (as perhaps the result of a throw) may also break the patella. In that case, there may be limited or no additional injury to the underlying structures of the knee joint. Striking the knee joint from the side is another way to cause serious injury to this joint. This often injures the medial collateral ligament (MCL) which could, with severe injuries, impair or prevent usage of the knee. In some cases, the knee may buckle and collapse when attempting to support the weight. The injury could require surgical intervention, but is often allowed to heal on its own (albeit, with crutches). A Yoko Kekomi Geri is likely to cause major injury when striking any aspect of the knee. This might be used to prevent someone from ultimately chasing you or to stop their aggression, but you will likely cause your foe to undergo reconstructive knee surgery or a long period of rehabilitation. So again, this is strictly a trade-off between their safety and yours. Don’t do any unnecessary harm. Injuring a Rib It is not easy to injure a rib. A strike such as Yoko Kekomi Geri or Mawashi Geri where a focused impact from a heel or the ball of the foot is driven into a focused area of the ribs may produce a bruised or fractured rib. If the kick lands near the sternum then a rib might suffer a dislocation. If a focused strike has sufficient power it might cause a broken portion of a rib to function a lung. This is a serious and possibly life-threatening injury. While not impossible, it may be difficult to derive sufficient power to cause this level of injury using common martial arts skills. Nonetheless, if you have suffered a strong impact on your ribs and then watch for symptoms involving difficulty breathing, your skin turning blue, sudden fatigue, and a rapid heart rate. If you have any symptoms such as these or others that might be related to internal bleeding or lack of oxygen, seek immediate medical attention. Most rib injuries (we are talking about those that do not result in a lung injury) are extremely painful. The pain lasts for weeks and often does not diminish during the full period of healing. This means the pain might remain intense for up to six weeks. Laughing, turning over in bed, and taking a deep breath will probably make you wince in pain. The problem with using a rib injury for any tactical advantage is that the pain often does not develop until several hours later. So creating a rib injury in the heat of a conflict does little to benefit you during the struggle. Injuring a Vital Organ Deliberately injuring a vital organ is a terrible thing to do to someone. If the injury is sufficiently severe it may result in the person’s death. In most cases (excluding the heart), the death may take from several hours to multiple days. So the injury does not provide any tangible benefit to you during a conflict. If the person dies because of an injury you inflicted, you will likely face severe legal and financial penalties. We do not suggest you should never strike a vital organ. If your life depends on that course of action then it might be justified. We do suggest you should not decide to injure a vital organ simply because you know how to do it. We have suggested in the past that you might target a kidney to cause immediate pay and perhaps put an end to hostilities. This is because it is unlikely (not impossible) that your strike will not cause sufficient injury to severely bruise or damage a kidney. But why take that risk if you have other options available? You should also consider where you strike someone in the torso. A firm strike to the ribcage in the vicinity of the heart might cause arrhythmia or cause the heart to stop altogether. This puts the recipient of your strike at risk of severe medical distress or death. This is true even when working with a training or sparring partner. A focused strike to the left middle ribs could cause your partner to suffer immediate heart problems. This is why we advocate not striking hard to this area of the body. Most people will not be affected by such strikes, but a person with an underlying heart condition may have an immediate major medical event. The brain is a vital organ susceptible to potential injury. A hard punch or powerful kick to the head may cause your opponent to lose consciousness. If you are involved in a sparring match you might feel joyous about your sudden victory. You should temper your joy with the realization that your opponent has just suffered a brain injury. Yes, you might end a fight by knocking your opponent out. A powerful strike to this vital organ can result in the immediate cessation of a fight. But the resulting injury may not be innocuous. We discuss brain injuries in detail elsewhere but they may be serious and can result in death for several hours (or less). Any strike to the head can result in a brain injury. If you or your training partner suffers cognitive, vision, balance, consciousness, memory, vomiting, headaches, or other unusual problems or symptoms following a blow to the head, immediate medical consultation at an emergency room is mandated. Any delay might result in a fatality. We suggest that Tensoku Ryu practitioners should not deliberately attempt to injury any vital organ. By definition, a person cannot live without these organs. Injuring a vital organ may put a person in a life-threatening situation that may not become apparent for some time. We submit that the only time it is justified to deliberately target a vital organ is when your life depends upon that action. Pain Targets Soft targets refer to areas of the body that can be struck with limited force or with parts of your body that might not withstand a highly percussive impact. They also are locations where an impact is likely to be very painful. Many of these will be pretty obvious, but we’ll cover a number of these areas of the body. Here’s a list of the most common soft targets: • Eyes • Eardrum • Neck and throat • Kidneys • Abdomen • Solar plexus • Genitals There are also areas of the body that are not soft but that are nonetheless quite painful when struck. Here is a quick list of some of these points: • Front of the tibia (shin bone) • Bridge of the Nose • Chin or jaw (mandible) • Back of the hand • Temple • Top of the foot • Either side of the ankle • Protruding hip bone • The knee cap (patella) • Individual ribs or the intercostal muscles between two ribs. Pinching is a technique few martial artists consider when thinking about inflicting pain on an opponent. Some areas of the body are more susceptible to this pain than are others. This pain can often be induced by a simple pinch, but sometimes the pain is more intense if a twisting motion is also applied. Here are some of the effective areas where pinching can cause a powerful pain response. • Inside the upper arm, below the bicep • Inside the thigh, about midway between the knee and the groin • Immediately forward of the armpit • A nipple • Top of the forearm • Inside of the forearm just forward of the elbow • On the outside chest wall just forward of where the bicep would be located if the arm were down • The very bottom of the earlobe You might also be able to pull or twist a body part to cause pain. This can be effective if you find yourself in close quarters with an opponent. You can often pull or twist the following parts of the body to cause pain. • Hair (head, facial, chest, armpit, etc.) • The nose • An ear • Any single finger • Any exposed skin area • The spinal column Utilizing some of these pain points may lead to serious injuries. In most cases, they result in moderate to intense pain with little or no lasting effects. The primary purpose of using a pain point is to distract the opponent momentarily so they expose a weakness that you can subsequently exploit. Therefore it is not likely that you will try to cause constant pain to an individual using these pain locations. Instead, you will probably cause momentary pain so that some future movement will be easier and more beneficial. Leave a Reply
global_05_local_5_shard_00002591_processed.jsonl/33191
Reducing SALT in Your Diet Your doctor has recommended you follow a low-salt diet. The following foods are examples of foods to be avoided. • Pickles, sauerkraut, olives • Vegetable juice, tomato juice • Fast food hamburgers, fries and milkshakes • Canned vegetables, canned soups • TV dinners • Chinese food (if made with soy sauce) Processed meats • Some antacids • Anchovies • Clams, oysters Of course this is not a complete list. Try to remember that processed foods will generally have higher sodium content. Try to select fresh fruits, vegetables and meats whenever possible. Substitute thyme, sage, lemon and other herbs and spices for salt when cooking to give food more flavor. When doing your grocery-shopping look for sodium on the food labels. Sodium may also be listed as: • Sodium chloride • Salt • Soy sauce • Teriyaki sauce • Baking soda • MSG Monosodium • Na (chemical symbol for sodium) you only need a pinch (about 500 mg ) of table salt each day. You should not consume more than 2000 mg of salt (sodium) each day.
global_05_local_5_shard_00002591_processed.jsonl/33210
Barry Cooper Barry Cooper Barry Cooper is an author and speaker who currently works for Christianity Explored Ministries, and has been worshipping at All Souls, Langham Place in London since 1996. He has an MA in English Literature from St Catherine’s College, Oxford, and an MA in Christian Studies from Trinity Divinity School in Chicago. There are 3 other Sermons by Barry Cooper on this site. Click here for full biography and list of Sermons Barry Cooper keywords: Murder, Hatred, Gossip, Slander, Reconciliation Exodus 20:13 By the time this sermon is over, the listener has been thoroughly exposed to the different expressions of murder across history. We think we are not murderers? Don’t be so sure when Jesus’ definition is presented! Related sermons Defending the Reconciling Gospel Michael Baughen keywords: Reconciliation, False Teaching, Righteousness, Grace, Discouragement, Courage, Ambassador Also by Barry Cooper Earn it! Here is the account of a rich young ruler falling at the feet of Christ in his desire for eternal life – only to meet with a reality check in regard to his true priorities and values. Barry illustrates his sermon vividly from a famous film.
global_05_local_5_shard_00002591_processed.jsonl/33214
Judge Dredd 8 (June 1984) Judge Dredd #8The resolution to the Las Vegas cliffhanger is a little lame. Dredd just happens to get there in time to challenge the sitting judge and there just happens to be a good resistance movement in place to help out. The whole subplot–the mob being the corrupt judges of Vegas–is weak anyway. But then Mills does a long flashback of Tweak (the alien) and his full story. It’s a nice diversion, leading to some nice character moments in the present action, as well as some affecting ones in the flashback. It’d be the highlight of the issue, if not for the finale. There’s a contrived battle scene in Death Valley. Dredd and company versus war robots. The setup stinks and the actual sequence is fantastic. Great pacing and writing also make up for the art getting too confused. Although the open is rough, the issue turns out quite well. Writers, John Wagner and Pat Mills; pencillers, Mike McMahon and Brian Bolland; inkers, McMahon, Dave Gibbons and Bolland; colorist, John Burns; letterers, John Aldrich, Gibbons and Tom Frame; editor, Nick Landau; publisher, Eagle Comics. Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/33234
Love Is a Choice Scripture Reading — Genesis 27:1-41; Malachi 1:2-5 You ask, ‘How have you loved us?’ "Was not Esau Jacob’s brother?” declares the Lord. “Yet I have loved Jacob, but Esau I have hated. . . .” — Malachi 1:2-3 God’s love is not a copy of ­human love. Sadly, human love is often only a poor copy of God’s love, and that causes some confusion when we see God acting or speaking in ways that we might think are not very loving. We like to assume that God’s love should meet our approval instead of the other way around. God’s comment on Esau is confusing in this way. Jacob and Esau were brothers, but for unstated reasons God chose to accept Jacob and reject Esau. This goes back to the story of Jacob and Esau from Genesis 27. Their father, Isaac, being deceived by Rebekah and Jacob, pronounced a lavish blessing on Jacob but only a limited one on Esau. This is actually a very important lesson about love. Many of us think of love as a feeling that might lead to certain choices. But real love, God’s kind of love, is actually a choice that leads to feelings. These verses in Malachi are saying that God made a loving choice of Jacob (through no merit on Jacob’s part) but not of Esau. Through Jacob, God worked out his plan of salvation that led to Jesus. We might never know the reason for that choice, but we do know that God’s love is not led by feelings. We also know that God is not in the habit of rejecting anyone who sincerely wants to be ­chosen by him. “I have loved you,” says our loving God. Jesus, you died on the cross to open a pathway for all of us to come to you. Thank you for loving us that much. Amen. Devotion topics: Bible, Good News, Christianity, Salvation, Discipleship, Love
global_05_local_5_shard_00002591_processed.jsonl/33239
How to Tune UPDATE SQL statement with IN subquery (I) ? The following is an example shows an Update SQL statement with an “IN” subquery. It updates records from emp_subsidiary that satisfies the “IN” subquery conditions. update emp_subsidiary set emp_name =‘Deleted Name’ where   emp_dept in (select dpt_id from department  where dpt_avg_salary<=6000); Here the following is the query plan of this SQL, it takes 7.55 seconds to finish the update. The query shows an attached_subqueries attached to a Full Index Scan of emp_subsidiary table. It means that the 295344 rows in emp_subsidiary is going to check the subquery’s conditions one by one. Let me rewrite the SQL into the following join update syntax. update emp_subsidiary e1, department d1 set    e1.emp_name=‘Deleted Name’ where  e1.emp_dept = d1.dpt_id        and d1.dpt_avg_salary <= 6000 The following is the query plan of the rewritten SQL and it takes only 1.22 seconds to complete. The new query plan shows a “Nested Loop” from Department table to Emp_subsidiary table, due to the condition “dpt_avg_salary <= 6000” has been executed before it is going to loop the Emp_subsidiary table, it saved a lot of unnecessary time to detect every record in Emp_subsidiary table. This kind of rewrites can be achieved by Tosska SQL Tuning Expert for MySQL automatically, it shows that the rewrite is more than 6 times faster than the original SQL.
global_05_local_5_shard_00002591_processed.jsonl/33242
Reader View PMG 2 Chapter 62: Tian Qiong Dies, Luo Chen Laughs PMG 2 Chapter 62: Tian Qiong Dies, Luo Chen Laughs Edited by RED At that moment, a disciple went up to Tian Qiong and gave him a box. Tian Qiong opened the box, and his face paled. He looked alarmed. There was Holy Fourth’s talisman in the box. There was a note inside too. Tian Qiong, you brought about your own destruction. Lin Feng “Fuck!” Tian Qiong destroyed the box and put the talisman into his ring. A few minutes later, the holy cultivators arrived with Xuan Yuan Mu. “Welcome Holy First, Sheng Hui.” “Welcome Holy Second, Dong Sheng.” “Welcome Holy Third, Yi Yun.” “Welcome Holy Fourth, Mo Da.” Xuan Yuan Mu introduced the four holy cultivators. Countless disciples cupped their fists as a sign of respect. It was also the first time Lin Feng had seen the other holy cultivators. He knew Mo Da, and they weren’t friends; he didn’t know the other ones, however. Lin Feng looked at them. Holy First was probably a High-Level Holy Emperor, he might be stronger than Bodhidharma. Holy Second Dong Sheng was probably a Low-Level Holy Emperor, but one who could already compete with High-Level Holy Emperors. Holy Third Yi Yun and Holy Fourth Mo Da were Low-Level Holy Emperors. They were probably equally strong. “Holy Fourth, everybody is here, can you sense where the talisman is?” asked Xuan Yuan Mu, bowing before Holy Fourth. Holy Fourth frowned. His talisman had been stolen and it was a serious issue, even a humiliation for him. Other people would make fun of him if he wasn’t capable of taking care of it. “Hehe, Mo Da, you lost your talisman, how humiliating!” chortled Holy Third Yi Yun, smiling broadly. Mo Da glanced at Yi Yun and shouted, “Yi Yun, be careful, your talisman could disappear someday, too!” “Haha, I’m not that careless, I always have it with me. How could I let a buffoon steal my talisman like you did?” replied Yi Yun mockingly. Xuan Yuan Mu smiled wryly. Holy Fourth and Holy Third did not like one another. Lin Feng also noticed the tensions between them. Mo Da ignored Yi Yun and rose up into the air. He closed his eyes and holy golden lights flashed and surrounded all the disciples. Tian Qiong was also surrounded by golden lights. His ring suddenly started shaking violently. “Eh? Take it out!” Tian Qiong wanted to control the talisman, but Mo Da shouted at that moment. Tian Qiong was suddenly drawn towards Holy Fourth. He fell down on the ground as his ring left his finger and moved towards Mo Da’s hand. Mo Da broke it, and the amber talisman appeared. Mo Da looked relieved. He had finally found it. If he hadn’t, he would have lost his holy cultivator status. At the same time, he was also furious, a mere disciple had dared steal his talisman? Xuan Yuan Mu’s eyes were wide. Tian Qiong was his disciple, and he had dared steal someone’s talisman? Many people looked at him, his face paled. How humiliating! “Why did you steal my talisman?!” shouted Holy Fourth furiously. Tian Qiong was surrounded by holy lights, if he didn’t talk, Holy Fourth could kill him. Tian Qiong’s heart was pounding. His face was as white as a sheet of paper. He regretted everything. As Lin Feng had said, he had acted recklessly and had brought about his own destruction. “No, I didn’t steal it. Someone called Luo Chen stole it!” said Tian Qiong. He knew that everything boded ill. But it was actually the truth, Luo Chen had stolen the talisman and told him he wanted to help him destroy Lin Feng. Everybody suddenly looked at Luo Chen. Mo Da looked at Luo Chen and said, “Did you steal that talisman?” “Holy Fourth, I’d like to tell you one thing.” said Luo Chen fearlessly. He was even smiling. When Mo Da heard Luo Chen, he frowned but nodded. He raised his left hand and drew Luo Chen towards him. Luo Chen to a few steps towards Mo Da and whispered a few things in his ear. Then he went back to the ground. Mo Da looked thoughtful. “Xuan Yuan Mu, Tian Qiong is your disciple, what should we do with him?” Mo Da asked Xuan Yuan Mu. Tian Qiong’s face paled. He looked at Luo Chen furiously, but Luo Chen was smiling indifferently. He didn’t even glance at Tian Qiong. Tian Qiong had failed, which meant he was a piece of trash. When Luo Chen learned that Lin Feng also controlled level two time Dao, he understood why. When Xuan Yuan Mu heard Mo Da, he stated, “Kill him!” “Alright, I’m going back then.” When Mo Da heard Xuan Yuan Mu, he nodded in satisfaction. He glanced at Luo Chen and then left the kwoon. The talisman had been found. He had no reason to be there anymore. When Mo Da left, Sheng Hui and Dong Sheng also left. Holy Third Yi Yun smiled indifferently and looked at Lin Feng, before walking over to him. When Lin Feng saw that Holy Third Yi Yun was coming over to him, he was surprised. “Holy Third, what do you want?” he asked, cupping his fist in greeting. Yi Yun shook his head and smiled broadly. “You’re Lin Feng? Brother Bodhidharma’s disciple?” “Indeed, it’s me,” Lin Feng nodded. “Alright, keep up the good work. I hope you’ll be selected during the holy cultivators’ exam and become Holy Fifth!” Holy Third Yi Yun said jokingly. But Lin Feng knew he wasn’t joking. “I will do my best!” replied Lin Feng with a nod. “Actually, you don’t need to wait, either. If you’re strong enough, you can also try and replace Holy Fourth!” Yi Yun said with a smile, as he left the kwoon. Lin Feng raised his head and looked after Yi Yun. Yi Yun’s last words were what he had really meant. Yi Yun meant that if Lin Feng was strong enough, he could maybe replace Holy Fourth. Holy Third wanted to use Lin Feng to get rid of Mo Da. Lin Feng looked at Tian Qiong, who looked deathly pale. Maybe he wouldn’t need to kill Tian Qiong himself this time. It seemed that Tian Qiong was doomed. Lin Feng left the kwoon. How Xuan Yuan Mu intended to deal with Tian Qiong didn’t concern him anymore. Ma Nan also left the kwoon silently. Tian Qiong had brought about his own destruction. Ma Nan had told him to be careful, but he hadn’t listened. Xuan Yuan Mu had just said that Tian Qiong had to die, so could he still survive? Unlikely. Luo Chen smiled at Tian Qiong. Tian Qiong glanced at him, too. What was happening was Luo Chen’s fault! Tian Qiong was furious, but Luo Chen didn’t care. He smiled and left the kwoon. Nobody knew what Luo Chen had told Mo Da, but the latter believed that Tian Qiong had stolen the talisman. Lin Feng didn’t know that Luo Chen had stolen the talisman, either. He didn’t know Luo Chen had plotted against him, either. If Lin Feng knew, he would have prevented Xuan Yuan Mu from killing Tian Qiong, but now Tian Qiong was doomed. “Die!” shouted someone furiously. Deadly energies streaked across the sky above the kwoon. Xuan Yuan Mu raised his left hand and made a cutting motion. Blood sprayed as Xuan Yuan Mu looked completely indifferent. “Alright, everybody can disperse,” shouted Xuan Yuan Mu. All the disciples quickly left. Only Tian Qiong’s corpse remained behind. After a few minutes, the members of the Tian Clan, including Tian Han, rushed over. He grabbed Tian Qiong’s body, his face filled with bitter hatred. “Lin Feng, the Tian Clan will never forgive you! ARGHHHH!” shouted Tian Han furiously, blaming only Lin Feng. What could he do, anyway? Blame the Gods Sect? Blame Xuan Yuan Mu? That would be a joke, right? “Let’s go back…” Tian Han said to the disciples of the Tian Clan, carrying Tian Qiong’s body as he left. Maybe the Tian Clan could still find a way make Tian Qiong’s soul come back to life using the body capture technique. They needed to go back to talk about it… 2019-01-29T16:13:36+00:00 January 14th, 2019|Peerless Martial God 2|6 Comments 1. John January 19, 2019 at 8:53 pm - Reply HAHAHA. That was hilarious! Way too go Tian!! 2. LAZ January 28, 2019 at 9:22 pm - Reply This is some bad writing. How did Ling Feng not find out that that Luo Chen set him up when Tian Qiong screamed it out in front of everyone?? ***“No, I didn’t steal it. Someone called Luo Chen stole it!”*** YET, a paragraph later it says that Ling Feng doesn’t know: If Lin Feng knew, he would have prevented Xuan Yuan Mu from killing Tian Qiong, but now Tian Qiong was doomed.*** • helmiOG February 5, 2019 at 2:08 am - Reply Indeed. Lin feng should at least suspected luo chen. And tian clan want to blame lin feng instead of luo chen? Sure, they have enmity towards each other but the one who kill tian qiong indirectly is luo chen. Dafuq author?! • Gray May 30, 2019 at 9:20 pm - Reply Yeah i can see it, not to mention LIN FENG has gone through Hundreds years of Hardship experience with this kind of schemes. In PMG 1, the Author mentioned that as long as the “cultivator” climbing next level or their realm, they will got Wisdom and Intelligent. So how could Lin Feng didn’t notice this? Yep.. Because the Author started to become Lazy. • SHINIGAMI September 10, 2019 at 5:46 pm - Reply well in PMG2 character of LIN FENG is completely changed he is now allowing his enemies to live after they have humiliated him what the heck is wrong with the author. 3. DeM0NxL0RD August 10, 2019 at 7:08 am - Reply Leave A Comment error: Content is protected !!
global_05_local_5_shard_00002591_processed.jsonl/33246
Nepali language words starting with "ख", page 1 of 1 - Translation Dictionary Page 1 of 1 of a list of words in the Nepali language starting with "ख." Main Nepali Page Browse by another Nepali letter Get Quote
global_05_local_5_shard_00002591_processed.jsonl/33264
Dear Lord Jesus and Mary, Mother of God, Hold all these brave souls in the palm of your hand, comfort them and their families. Send angels of protection, love, and comfort to all the service men and women still at war, bring them home safely and comfort their families. We ask all our prayers in Jesus’ name. 1. All the soilders that have fallen please Lord help their families and take all that fallen in battle to heaven to be with you. 2. I thought all included ALL? Didn’t know that all doesn’t include gay soldiers, and they required a separate thanks? 3. To Elzéar of Sabran patron Saint of Soldiers : for the relief of the families of the Missing of the Forgotten War whose loved ones are still in North Korea–that the relations between US and North Korea be opened anotugh so the missing loved ones can be recovered and give peace to their grieving relations Please enter your comment! Please enter your name here
global_05_local_5_shard_00002591_processed.jsonl/33271
The Gigantes (ギガンテス Gigantesu) are massive apes that appeared in episode 28 of Ultraman Dyna. Originally, they are a race of gigantic Australopithecus that have gone extinct 1 million years ago as the two last member male and female survived till today. Subtitle: Giant Ape-Man (巨大猿人 Kyodai Enjin) Ultraman Dyna The male Gigantes was a very strong ape-like monster who wanted to get the attention of a female of his species. While Asuka was patrolling the dwelling area of the Gigantes, the male blasted Asuka's jet out of the sky. After Asuka was discovered by the female, and the ape seemed to be attracted to him more than the male Gigantes, which caused the latter to go on a rampage. He left the forest to kill humanity and regain the love of his life. When the male Gigantes found the female, he was rejected once again. This drove him even more enranged in its attack. Knowing what the monster wanted, Asuka transformed into Ultraman Dyna and challenged it. The male Gigantes proved to be a formidable opponent to Dyna's Strong Type, but when the Ultra saw that the female was watching, he knew the victor would take her. Knowing that this rampage was caused by the female falling for Asuka, Dyna allowed himself to be thrown around and seemingly beaten. The female, impressed by the battle, took the male as her mate. The pair retreated back to the forest, never to be seen again. • Suit Actors: Toshio (Male), Suzuki Rikako (Female) • In early versions of the episode, the females were to look closer to human beings, also being the same size. This was likely changed due to problems of size. Ultraman Z Although not physically seen, Gigantes is one of the hibernating monsters awaken when Genegarg crashed on Earth. It was located in India. • The fact that Gigantes was found in India is a probable reference to Gigantopithecus, an extinct species of ape related to orangutans found in India. Gigantes (Male) Male Gigantes • Height: 56 m • Weight: 58,000 t • Origin: West Asia Forest Powers and Weapons • Foam: The male Gigantes can fire a stream of foam from his mouth to take down aerial opponents. • Anesthesia Resistance: Male Gigantes can overcome the effects of the Anesthesia drug that used to transquilize animals. Gigantes (Female) Female Gigantes • Height: 52 m • Weight: 51,000 t • Origin: West Asia Forest Powers and Weapons • None Ultraman Dyna Kaiju
global_05_local_5_shard_00002591_processed.jsonl/33277
Pub Date2010 Link to Publisher The Unfinished Enlightenment: Description in the Age of Encyclopedia Joanna Stalnaker Cornell University Press In The Unfinished Enlightenment, Joanna Stalnaker offers a fresh look at the French Enlightenment by focusing on the era’s vast, collective attempt to compile an ongoing and provisional description of the world. Through a series of readings of natural histories, encyclopedias, scientific poetry, and urban topographies, the book uncovers the deep epistemological and literary tensions that made description a central preoccupation for authors such as Buffon, Bernardin de Saint-Pierre, Diderot, Delille, and Mercier. Stalnaker argues that Enlightenment description was the site of competing truth claims that would eventually resolve themselves in the modern polarity between literature and science. By the mid-nineteenth century, the now habitual association between description and the novel was already firmly anchored in French culture, but just a century earlier, in the diverse network of articles on description in Diderot and d’Alembert’s Encyclopédie and in the works derived from it, there was not a single mention of the novel. Instead, we find articles on description in natural history, geometry, belles-lettres, and poetry. Stalnaker builds on the premise that the tendency to view description as the inevitable (and subservient) partner of narration—rather than as a universal tool for making sense of knowledge in all fields—has obscured the central place of description in Enlightenment discourse. As a result, we have neglected some of the most original and experimental works of the eighteenth century.
global_05_local_5_shard_00002591_processed.jsonl/33289
Chart Reading Template Thanks for being here, Below are three videos and one .pdf file. The PDF also have a link to the chart reading template. FYI – This chart is in the South Indian style and is based on the Sidereal Zodiac, not the Zodiac used in Western astrology. Chart Reading Template Video Venus Promises and Disappointments Ripening of Karmas
global_05_local_5_shard_00002591_processed.jsonl/33310
New Dawn New Dawn Having started out life as an Argentine restaurant and steakhouse, find Hoża spreading their wings with an updated menu authored by new chef Michał Mizak. Integrated alongside the Latin favorites expect dishes that reflect the city’s appetite for regional Polish produce. ul. Hoża 25A Add a comment No comments so far. Be first to leave comment below. 10 + 5 = Subscribe to our newsletter
global_05_local_5_shard_00002591_processed.jsonl/33311
The online Map of Early Modern London (MoEML) is soliciting contributors to its London Parish Project, an initiative that will create entries for each of the more than 100 city parishes. Contributors will be able to share their own photographs and/or transcriptions of parish documents that can now only be consulted in person at the London Metropolitan Archives or elsewhere. For further information please check the attached 'Call for Contributors' and / or write to the project coordinator, Chris Highley at 1 attachment